Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2004/Feb/msg00000.html | |
http://www.atstake.com/research/advisories/2004/a022304-1.txt | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/841742 | Third Party Advisory US Government Resource |
http://www.osvdb.org/6822 | |
http://www.securityfocus.com/bid/9730 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/15297 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2004-09-01T04:00:00
Updated: 2004-08-18T00:00:00
Reserved: 2004-02-18T00:00:00
Link: CVE-2004-0165
JSON object: View
NVD Information
Status : Modified
Published: 2004-03-15T05:00:00.000
Modified: 2017-10-10T01:30:18.470
Link: CVE-2004-0165
JSON object: View
Redhat Information
No data.
CWE