2.1
CVSSv2

CVE-2004-0564

Published: 23/12/2004 Updated: 11/07/2017
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer's warnings.

Vulnerable Product Search on Vulmon Subscribe to Product

roaring penguin pppoe 3.0

roaring penguin pppoe 3.3

roaring penguin pppoe 3.5

debian debian linux 3.0

Vendor Advisories

Debian Bug report logs - #343264 [CVE-2004-0564] attackers can overwrite any files when run with setuid root Package: pppoe; Maintainer for pppoe is Andreas Barth <aba@notsoarghorg>; Source for pppoe is src:rp-pppoe (PTS, buildd, popcon) Reported by: FX <gentoo@sbcglobalnet> Date: Wed, 14 Dec 2005 01:33:02 UTC S ...
Max Vozeler discovered a vulnerability in pppoe, the PPP over Ethernet driver from Roaring Penguin When the program is running setuid root (which is not the case in a default Debian installation), an attacker could overwrite any file on the file system For the stable distribution (woody) this problem has been fixed in version 33-12 For the uns ...