CVE-2006-2194

The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
Configurations

Configuration 1 (hide)

cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://secunia.com/advisories/20963 - () http://secunia.com/advisories/20963 -
References () http://secunia.com/advisories/20967 - Patch, Vendor Advisory () http://secunia.com/advisories/20967 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20987 - Patch, Vendor Advisory () http://secunia.com/advisories/20987 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20996 - Patch, Vendor Advisory () http://secunia.com/advisories/20996 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1106 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1106 - Patch, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:119 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:119 -
References () http://www.osvdb.org/26994 - () http://www.osvdb.org/26994 -
References () http://www.securityfocus.com/bid/18849 - Patch () http://www.securityfocus.com/bid/18849 - Patch
References () http://www.ubuntu.com/usn/usn-310-1 - () http://www.ubuntu.com/usn/usn-310-1 -

Information

Published : 2006-07-05 18:05

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2194

Mitre link : CVE-2006-2194

CVE.ORG link : CVE-2006-2194


JSON object : View

Products Affected

point-to-point_protocol_project

  • point-to-point_protocol