Announcement

Collapse
No announcement yet.

Linux PPPD Has A 17 Year Old Vulnerability That Could Lead To Remote Code Execution

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Linux PPPD Has A 17 Year Old Vulnerability That Could Lead To Remote Code Execution

    Phoronix: Linux PPPD Has A 17 Year Old Vulnerability That Could Lead To Remove Code Execution

    It turns out the Point-to-Point Protocol Daemon (PPPD) used for dial-up models, DSL, and other point-to-point network setups on Linux has been bugged for the past seventeen years with a buffer overflow vulnerability that could lead to remote code execution at the system level...

    http://www.phoronix.com/scan.php?pag...2020-PPPD-Flaw

  • #2
    Linux PPPD Has A 17 Year Old Vulnerability That Could Lead To Remove Code Execution
    typo,for one second I was wondering what's remove code execution....

    Comment


    • #3
      Originally posted by lilunxm12 View Post
      typo,for one second I was wondering what's remove code execution....
      Doh, thanks.
      Michael Larabel
      http://www.michaellarabel.com/

      Comment


      • #4
        I'm correct in thinking that '-fstack-protector-strong' used on Fedora, Arch etc make the exploit just crash ppp?

        Comment


        • #5
          The real challenge will be getting all those consumer routers which include pppd (which is many/most of them, although not all of them are actively running pppd) upgraded. Not only are many of those routers no longer being supported by the manufacturer at all, even for those that are still supported the owner typically does not upgrade the firmware.

          Comment


          • #6
            Originally posted by CommunityMember View Post
            The real challenge will be getting all those consumer routers which include pppd (which is many/most of them, although not all of them are actively running pppd) upgraded. Not only are many of those routers no longer being supported by the manufacturer at all, even for those that are still supported the owner typically does not upgrade the firmware.
            Isn't it used in OpenWRT?

            Comment


            • #7
              2 questions: Is this only linux's pppd or does it affect other OSes? (A certain someone has a very bad habit of typing "linux" when he should type "FLOSS".) Michael, if remote execution is bad, why does your web site do it? :-( BTW, "dial-up models" should probably be "dial-up modems".

              Comment


              • #8
                Originally posted by Britoid View Post

                Isn't it used in OpenWRT?
                Yes it is, and the highlight of their recent 19.07.2 release is to patch this vulnerability.

                Comment


                • #9
                  Originally posted by Britoid View Post
                  Isn't it used in OpenWRT?
                  I believe so. Many FLOSS (to avoid Dieter's wrath) and many non-FLOSS (pretty sure at least Solaris and MacOS) projects have included pppd for quite a long time. The good news is that while it is shipped it is less commonly running than it was in the past. But even a small fraction of a percentage is a lot of people potentially impacted.

                  Comment


                  • #10
                    #manyeyeballs

                    Comment

                    Working...
                    X