Vulnerability
rp-pppoe
Affected
rp-pppoe versions <= 2.4
Description
Robert Schlabbach found following. There is a denial-of-service
vulnerability in rp-pppoe versions up to 2.4. rp-pppoe is a
user-space PPPoE client for a bunch of UNIXes and Linux, used by
many residential ADSL customers.
If you use the "Clamp MSS" option and someone crafts a TCP packet
with an (illegal) "zero-length" option, rp-pppoe will fall into
an endless loop. Eventually, the PPP daemon should time out and
kill the connection.
Solution
Upgrade to rp-pppoe 2.5 at
http://www.roaringpenguin.com/pppoe/
If you cannot upgrade quickly, do not use the "Clamp MSS" option
until you can upgrade.
For Linux-Mandrake:
Linux-Mandrake 7.1: 7.1/RPMS/rp-pppoe-2.5-2.1mdk.i586.rpm
7.1/SRPMS/rp-pppoe-2.5-2.1mdk.src.rpm
Linux-Mandrake 7.2: 7.2/RPMS/rp-pppoe-2.5-2.2mdk.i586.rpm
7.2/SRPMS/rp-pppoe-2.5-2.2mdk.src.rpm
For Red Hat:
ftp://updates.redhat.com/7.0/alpha/rp-pppoe-2.5-1.alpha.rpm
ftp://updates.redhat.com/7.0/i386/rp-pppoe-2.5-1.i386.rpm
ftp://updates.redhat.com/7.0/SRPMS/rp-pppoe-2.5-1.src.rpm
For Conectiva Linux:
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/rp-pppoe-2.5-1cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/rp-pppoe-2.5-1cl.i386.rpm
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH