Description
The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
Published: 2006-07-05
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1106-1 New ppp packages fix privilege escalation
Debian DSA Debian DSA DSA-1150-1 New shadow packages fix privilege escalation
EUVD EUVD EUVD-2006-2195 The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.
Ubuntu USN Ubuntu USN USN-310-1 ppp vulnerability
History

No history.

Subscriptions

Point-to-point Protocol Project Point-to-point Protocol
cve-icon MITRE

Status: PUBLISHED

Assigner: debian

Published:

Updated: 2024-08-07T17:43:28.569Z

Reserved: 2006-05-04T00:00:00.000Z

Link: CVE-2006-2194

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-07-05T18:05:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2006-2194

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses