{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2008-1215", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing \"~\" characters." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20080229 *BSD user-ppp local root (when conditions permit)", "refsource" : "VULN-DEV", "url" : "http://www.securityfocus.com/archive/82/488980/30/0/threaded" }, { "name" : "20080301 Re: *BSD user-ppp local root (when conditions permit)", "refsource" : "VULN-DEV", "url" : "http://www.securityfocus.com/archive/82/489031/30/0/threaded" }, { "name" : "[4.1] 20080307 014: SECURITY FIX: March 7, 2008", "refsource" : "OPENBSD", "url" : "http://www.openbsd.org/errata41.html#014_ppp" }, { "name" : "[4.2] 20080307 009: SECURITY FIX: March 7, 2008", "refsource" : "OPENBSD", "url" : "http://www.openbsd.org/errata42.html#009_ppp" }, { "name" : "28090", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/28090" }, { "name" : "29234", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/29234" }, { "name" : "29238", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/29238" }, { "name" : "29240", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/29240" }, { "name" : "userppp-commandexpandinterpret-bo(41034)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/41034" } ] } }