ppp vulnerability

Related Vulnerabilities: CVE-2006-2194  

Marcus Meissner discovered that the winbind plugin of pppd does not check the result of the setuid() call. On systems that configure PAM limits for the maximum number of user processes and enable the winbind plugin, a local attacker could exploit this to execute the winbind NTLM authentication helper as root. Depending on the local winbind configuration, this could potentially lead to privilege escalation.

The problem can be corrected by updating your system to the following package versions:

6 July 2006

ppp vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 6.06 LTS
  • Ubuntu 5.10

Software Description

Details

Marcus Meissner discovered that the winbind plugin of pppd does not check the result of the setuid() call. On systems that configure PAM limits for the maximum number of user processes and enable the winbind plugin, a local attacker could exploit this to execute the winbind NTLM authentication helper as root. Depending on the local winbind configuration, this could potentially lead to privilege escalation.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 6.06 LTS
ppp - 2.4.4b1-1ubuntu3.1
ppp-dev - 2.4.4b1-1ubuntu3.1
ppp-udeb - 2.4.4b1-1ubuntu3.1
Ubuntu 5.10
ppp - 2.4.3-20050321+2ubuntu1.1
ppp-dev - 2.4.3-20050321+2ubuntu1.1
ppp-udeb - 2.4.3-20050321+2ubuntu1.1

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

References