The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1106-1 New ppp packages fix privilege escalation
Debian DSA Debian DSA DSA-1150-1 New shadow packages fix privilege escalation
EUVD EUVD EUVD-2006-2195 The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
Ubuntu USN Ubuntu USN USN-310-1 ppp vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-07T17:43:28.569Z

Reserved: 2006-05-04T00:00:00

Link: CVE-2006-2194

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-07-05T18:05:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2006-2194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.