First published: Thu Jun 14 2018(Updated: )
Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/ppp | <2.4.7-2+2ubuntu1.1 | 2.4.7-2+2ubuntu1.1 |
ubuntu/ppp | <2.4.7-2+3ubuntu1 | 2.4.7-2+3ubuntu1 |
ubuntu/ppp | <2.4.5-5.1ubuntu2.3 | 2.4.5-5.1ubuntu2.3 |
ubuntu/ppp | <2.4.7-2+3 | 2.4.7-2+3 |
ubuntu/ppp | <2.4.7-1+2ubuntu1.16.04.1 | 2.4.7-1+2ubuntu1.16.04.1 |
Point-to-point Protocol Project Point-to-point Protocol | <2.4.9 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
<2.4.9 | ||
=14.04 | ||
=16.04 | ||
=18.04 | ||
debian/ppp | 2.4.7-2+4.1+deb10u1 2.4.9-1+1 2.4.9-1+1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11574 is a vulnerability that involves improper input validation and an integer overflow in the EAP-TLS protocol implementation in PPPD.
The severity of CVE-2018-11574 is critical with a CVSS score of 9.8.
CVE-2018-11574 may cause a crash, information disclosure, or authentication bypass on affected systems.
PPPD versions up to and including 2.4.9, Canonical Ubuntu Linux 14.04, 16.04, and 18.04, and certain versions of the ppp package in Debian and Ubuntu are affected by CVE-2018-11574.
To fix CVE-2018-11574, upgrade to a patched version of PPPD (version 2.4.9 or higher) or update the ppp package to the recommended versions provided by the respective vendors.