First published: Thu Nov 04 2004(Updated: )
Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Point-to-Point Protocol (PPP) | =2.4.1 | |
Samba | =2.4.1 | |
Ubuntu | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1002 has a moderate severity rating as it allows remote denial of service by causing a crash.
To fix CVE-2004-1002, update the Point-to-Point Protocol (PPP) to a version newer than 2.4.1.
CVE-2004-1002 affects Point-to-Point Protocol version 2.4.1, Samba PPP 2.4.1, and Ubuntu Linux 4.10.
CVE-2004-1002 can be exploited by sending a CBCP packet with an invalid length value to the pppd service.
A temporary workaround for CVE-2004-1002 involves disabling CBCP or restricting access to the pppd service.