The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
References
Link | Resource |
---|---|
http://secunia.com/advisories/20963 | |
http://secunia.com/advisories/20967 | Patch Vendor Advisory |
http://secunia.com/advisories/20987 | Patch Vendor Advisory |
http://secunia.com/advisories/20996 | Patch Vendor Advisory |
http://www.debian.org/security/2006/dsa-1106 | Patch Vendor Advisory |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:119 | |
http://www.osvdb.org/26994 | |
http://www.securityfocus.com/bid/18849 | Patch |
http://www.ubuntu.com/usn/usn-310-1 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2006-07-05 18:05
Updated : 2024-02-28 10:42
NVD link : CVE-2006-2194
Mitre link : CVE-2006-2194
CVE.ORG link : CVE-2006-2194
JSON object : View
Products Affected
point-to-point_protocol_project
- point-to-point_protocol
CWE