7.2
CVSSv2

CVE-2006-2194

Published: 05/07/2006 Updated: 24/02/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The winbind plugin in pppd for ppp 2.4.4 and previous versions does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

point-to-point protocol project point-to-point protocol

Vendor Advisories

Marcus Meissner discovered that the winbind plugin of pppd does not check the result of the setuid() call On systems that configure PAM limits for the maximum number of user processes and enable the winbind plugin, a local attacker could exploit this to execute the winbind NTLM authentication helper as root Depending on the local winbind configur ...
Marcus Meissner discovered that the winbind plugin in pppd does not check whether a setuid() call has been successful when trying to drop privileges, which may fail with some PAM configurations The old stable distribution (woody) is not affected by this problem For the stable distribution (sarge) this problem has been fixed in version 243-20050 ...