Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 09 Mar 2020 06:49:54 -0700
From:      Cy Schubert <Cy.Schubert@cschubert.com>
To:        freebsd-security@freebsd.org, Miroslav Lachman <000.fbsd@quip.cz>, freebsd security <freebsd-security@freebsd.org>
Subject:   Re: Critical PPP Daemon Flaw
Message-ID:  <5FD9E59C-1B15-4B07-AA5E-1B6F40CBDD08@cschubert.com>
In-Reply-To: <13df3361-87b6-c6c1-e79d-2bbdd0146518@quip.cz>
References:  <13df3361-87b6-c6c1-e79d-2bbdd0146518@quip.cz>

next in thread | previous in thread | raw e-mail | index | archive | help

On March 9, 2020 4:23:10 AM PDT, Miroslav Lachman <000.fbsd@quip.cz> wrote:
>I don't know if FreeBSD is vulnerable or not. There are main Linux 
>distros and NetBSD listed in the article.
>
>https://thehackernews.com/2020/03/ppp-daemon-vulnerability.html
>
>The vulnerability, tracked as CVE-2020-8597 [1] with CVSS Score 9.8,
>can 
>be exploited by unauthenticated attackers to remotely execute arbitrary
>
>code on affected systems and take full control over them.
>
>[1] https://www.kb.cert.org/vuls/id/782301/
>
>Kind regards
>Miroslav Lachman
>_______________________________________________
>freebsd-security@freebsd.org mailing list
>https://lists.freebsd.org/mailman/listinfo/freebsd-security
>To unsubscribe, send any mail to
>"freebsd-security-unsubscribe@freebsd.org"

Probably not. Ours is a different codebase from NetBSD. I haven't looked at what Red Hat has, no comment about theirs. However it would be prudent to verify our pppd isn't also vulnerable.



-- 
Pardon the typos and autocorrect, small keyboard in use. 
Cy Schubert <Cy.Schubert@cschubert.com>
FreeBSD UNIX: <cy@FreeBSD.org> Web: https://www.FreeBSD.org

The need of the many outweighs the greed of the few.

Sent from my Android device with K-9 Mail. Please excuse my brevity.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5FD9E59C-1B15-4B07-AA5E-1B6F40CBDD08>