Home > Security > Advisories


Mandriva Advisories

Package name rp-pppoe
Date December 18th, 2000
Advisory ID MDKSA-2000:084
Affected versions 7.1, 7.2
Synopsis Updated rp-pppoe packages fix security problems

Problem Description

rp-pppoe is a userspace PPPoE client mainly used with ADSL connections
which require PPP. Versions prior to 2.5 have a security problem that,
when exploited, causes the connection to be dropped. If rp-pppoe
receives a crafted TCP segment with an option where the option-length
field is zero (illegal), the program would enter an infinite loop and
the connection would time-out and be dropped. This is only possible
if the user uses the "Clamp MSS" option.

Updated Packages

Mandrakelinux 7.1

 589bdccafbf374244ea2e940ae6df7ba  7.1/RPMS/rp-pppoe-2.5-2.1mdk.i586.rpm
e07be9faefcf1a58df48e872c9c7c068  7.1/SRPMS/rp-pppoe-2.5-2.1mdk.src.rpm

Mandrakelinux 7.2

 d64a2bff24c05941624865facbc3ac8e  7.2/RPMS/rp-pppoe-2.5-2.2mdk.i586.rpm
0fdd0cc473288e52e64087025b93f341  7.2/SRPMS/rp-pppoe-2.5-2.2mdk.src.rpm


To upgrade automatically, use MandrivaUpdate.


Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.