ArchLinux: 201508-3: ppp: denial of service
Summary
A buffer overflow has been found in the rc_mksid() function in plugins/radius/util.c in Paul's PPP Package (ppp). When the PID of the pppd process is greater than 65535, the computation of a start accounting message to the RADIUS server will crash the pppd server.
Resolution
Upgrade to 2.4.7-2.
# pacman -Syu "ppp>=2.4.7-2"
The problem has not been fixed upstream yet.
References
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3310 https://www.openwall.com/lists/oss-security/2015/04/16/7 https://bugs.archlinux.org/task/44607 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782450
![Dist Arch](/images/distros/dist-arch.png)
Workaround
This issue can be mitigated by disabling RADIUS authentication.