Point-to-Point Protocol Project Point-to-Point Protocol 2.4.8

CPE Details

Point-to-Point Protocol Project Point-to-Point Protocol 2.4.8
2.4.8
2020-02-06
16h59 +00:00
2020-02-06
16h59 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:2.4.8:*:*:*:*:*:*:*

Informations

Vendor

point-to-point_protocol_project

Product

point-to-point_protocol

Version

2.4.8

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-8597 2020-02-03 21h58 +00:00 eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions.
9.8
Critique
CVE-2018-11574 2018-06-14 18h00 +00:00 Improper input validation together with an integer overflow in the EAP-TLS protocol implementation in PPPD may cause a crash, information disclosure, or authentication bypass. This implementation is distributed as a patch for PPPD 0.91, and includes the affected eap.c and eap-tls.c files. Configurations that use the `refuse-app` option are unaffected.
9.8
Critique