CVE-2004-0165

Severity

50%

Complexity

99%

Confidentiality

48%

Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.

Format string vulnerability in Point-to-Point Protocol (PPP) daemon (pppd) 2.4.0 for Mac OS X 10.3.2 and earlier allows remote attackers to read arbitrary pppd process data, including PAP or CHAP authentication credentials, to gain privileges.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:N).

Overview

Type

Apple Mac OS X

First reported 20 years ago

2004-03-15 05:00:00

Last updated 7 years ago

2017-10-10 01:30:00

Affected Software

Apple Mac OS X 10.1

10.1

Apple Mac OS X 10.1.1

10.1.1

Apple Mac OS X 10.1.2

10.1.2

Apple Mac OS X 10.1.3

10.1.3

Apple Mac OS X 10.1.4

10.1.4

Apple Mac OS X 10.1.5

10.1.5

Apple Mac OS X 10.2

10.2

Apple Mac OS X 10.2.1

10.2.1

Apple Mac OS X 10.2.2

10.2.2

Apple Mac OS X 10.2.3

10.2.3

Apple Mac OS X 10.2.4

10.2.4

Apple Mac OS X 10.2.5

10.2.5

Apple Mac OS X 10.2.6

10.2.6

Apple Mac OS X 10.2.7

10.2.7

Apple Mac OS X 10.2.8

10.2.8

Apple Mac OS X 10.3

10.3

Apple Mac OS X 10.3.1

10.3.1

Apple Mac OS X 10.3.2

10.3.2

Apple Mac OS X Server 10.1

10.1

Apple Mac OS X Server 10.1.1

10.1.1

Apple Mac OS X Server 10.1.2

10.1.2

Apple Mac OS X Server 10.1.3

10.1.3

Apple Mac OS X Server 10.1.4

10.1.4

Apple Mac OS X Server 10.1.5

10.1.5

Apple Mac OS X Server 10.2

10.2

Apple Mac OS X Server 10.2.1

10.2.1

Apple Mac OS X Server 10.2.2

10.2.2

Apple Mac OS X Server 10.2.3

10.2.3

Apple Mac OS X Server 10.2.4

10.2.4

Apple Mac OS X Server 10.2.5

10.2.5

Apple Mac OS X Server 10.2.6

10.2.6

Apple Mac OS X Server 10.2.7

10.2.7

Apple Mac OS X Server 10.2.8

10.2.8

Apple Mac OS X Server 10.3

10.3

Apple Mac OS X Server 10.3.1

10.3.1

Apple Mac OS X Server 10.3.2

10.3.2

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.