Vulnerabilities > CVE-2004-1002 - Integer Underflow (Wrap or Wraparound) vulnerability in multiple products

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
HIGH
network
low complexity
samba
canonical
CWE-191
nessus

Summary

Integer underflow in pppd in cbcp.c for ppp 2.4.1 allows remote attackers to cause a denial of service (daemon crash) via a CBCP packet with an invalid length value that causes pppd to access an incorrect memory location.

Vulnerable Configurations

Part Description Count
Application
Samba
1
OS
Canonical
1

Common Weakness Enumeration (CWE)

Nessus

NASL familyGentoo Local Security Checks
NASL idGENTOO_GLSA-200411-01.NASL
descriptionThe remote host is affected by the vulnerability described in GLSA-200411-01 (ppp: Remote denial of service vulnerability) The pppd server improperly verifies header fields, making it vulnerable to denial of service attacks. Impact An attacker can cause the pppd server to access memory that it isn't allowed to, causing the server to crash. No code execution is possible with this vulnerability, because no data is getting copied. Workaround There is no known workaround at this time.
last seen2016-09-26
modified2004-11-02
plugin id15589
published2004-11-02
reporterTenable
sourcehttps://www.tenable.com/plugins/index.php?view=single&id=15589
title[GLSA-200411-01] ppp: Remote denial of service vulnerability
code
#%NASL_MIN_LEVEL 999999

# @DEPRECATED@
#
# This script has been deprecated and is no longer used as the
# Gentoo advisory says the issue has no security impact.
#
# Disabled on 2011/05/27. 
#
# This script was automatically generated from 
#  http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml
# It is released under the Nessus Script Licence.
# The messages are release under the Creative Commons - Attribution /
# Share Alike license. See http://creativecommons.org/licenses/by-sa/2.0/
#
# Avisory is copyright 2001-2004 Gentoo Foundation, Inc.
# GLSA2nasl Convertor is copyright 2004 Michel Arboi

if (! defined_func('bn_random')) exit(0);

include('compat.inc');

if (description)
{
 script_id(15589);
 script_version("1.6");

 script_cve_id("CVE-2004-1002");
 script_xref(name: "GLSA", value: "200411-01");

 script_set_attribute(attribute:'synopsis', value: 'The remote host is missing the GLSA-200411-01 security update.');
 script_set_attribute(attribute:'description', value: 'The remote host is affected by the vulnerability described in
GLSA-200411-01 (ppp: Remote denial of service vulnerability)

    The pppd server improperly verifies header fields, making it vulnerable to
    denial of service attacks.
  
Impact

    An attacker can cause the pppd server to access memory that it isn\'t
    allowed to, causing the server to crash. No code execution is possible with
    this vulnerability, because no data is getting copied.
  
Workaround

    There is no known workaround at this time.');
script_set_attribute(attribute: 'see_also', value: 'http://www.securityfocus.com/archive/1/379450');
script_set_attribute(attribute: 'see_also', value: 'http://www.gentoo.org/security/en/glsa/glsa-200411-01.xml');

script_set_attribute(attribute:'solution', value: '    All ppp users should upgrade to the latest version:
    # emerge --sync
    # emerge --ask --oneshot --verbose ">=net-dialup/ppp-2.4.2-r7"');
script_set_attribute(attribute: 'cvss_vector', value: 'CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P');
 script_set_attribute(attribute:"plugin_publication_date", value: "2004/11/02");
script_end_attributes();

 script_copyright(english: "This script is Copyright (C) 2004-2018 Tenable Network Security, Inc.");
 script_name(english: "[GLSA-200411-01] ppp: Remote denial of service vulnerability");
 script_category(ACT_GATHER_INFO);
 script_family(english: "Gentoo Local Security Checks");
 script_dependencies("ssh_get_info.nasl");
 script_require_keys('Host/Gentoo/qpkg-list');
 script_summary(english: 'ppp: Remote denial of service vulnerability');
 exit(0);
}

exit(0); # Gentoo now claims it's not an issue
include('qpkg.inc');
if (qpkg_check(package: "net-dialup/ppp", unaffected: make_list("ge 2.4.2-r7"), vulnerable: make_list("lt 2.4.2-r7")
)) { security_warning(0); exit(0); }

Statements

contributorMark J Cox
lastmodified2006-08-30
organizationRed Hat
statementThis issue is only will only cause a denial of service on the connection the attacker is using. It therefore is not a security issue.