Point-to-Point Protocol Project Point-to-Point Protocol 2.4.7

CPE Details

Point-to-Point Protocol Project Point-to-Point Protocol 2.4.7
2.4.7
2020-02-06
16h59 +00:00
2020-02-06
16h59 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.7:*:*:*:*:*:*:*

Informations

Vendor

point-to-point_protocol_project

Product

point-to-point_protocol

Version

2.4.7

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2020-8597 2020-02-03 21h58 +00:00 eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
9.8
Critical
CVE-2018-11574 2018-06-14 18h00 +00:00 Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
9.8
Critical