Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Link | Tags |
---|---|
https://www.ubuntu.com/usn/usn-12-1/ | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17874 | third party advisory vdb entry |
http://www.securityfocus.com/archive/1/379450 | broken link mailing list third party advisory vdb entry |