Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
Link | Tags |
---|---|
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 | vdb entry |
http://www.kb.cert.org/vuls/id/841742 | third party advisory us government resource |
http://www.osvdb.org/6822 | vdb entry |
http://www.securityfocus.com/bid/9730 | vdb entry patch vendor advisory |
http://www.atstake.com/research/advisories/2004/a022304-1.txt | exploit patch vendor advisory |