First published: Sun Mar 09 2008(Updated: )
Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing "~" characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.3 | |
FreeBSD Kernel | =7.0 | |
NetBSD current | ||
OpenBSD | =4.1 | |
OpenBSD | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1215 has a high severity rating due to the potential for local users to gain elevated privileges.
To fix CVE-2008-1215, users should apply the appropriate patches or updates provided by their operating system's maintainers.
CVE-2008-1215 affects FreeBSD versions 6.3 and 7.0, OpenBSD versions 4.1 and 4.2, and NetBSD.
The vulnerability in CVE-2008-1215 is caused by a stack-based buffer overflow in the command_Expand_Interpret function.
No, CVE-2008-1215 is a local vulnerability that can only be exploited by local users with access to the affected systems.