|Category:||Ubuntu Local Security Checks|
|Title:||Ubuntu 4.10 USN-12-1 (ppp)|
|Summary:||Ubuntu 4.10 USN-12-1 (ppp)|
The remote host is missing an update to ppp
announced via advisory USN-12-1.
It has been discovered that ppp does not properly verify certain data
structures used in the CBCP protocol. This vulnerability could allow
an attacker to cause the pppd server to crash due to an invalid memory
access, leading to a denial of service. However, there is no
possibility of code execution or privilege escalation.
The following packages are affected: ppp
The problem can be corrected by upgrading the affected packages to
version 2.4.2+20040428-2ubuntu6.2. In general, a standard system
upgrade is sufficient to effect the necessary changes.
Risk factor : High
|Copyright||Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com|
|This is only one of 39212 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.