CVE-2006-2194
Summary
| CVE | CVE-2006-2194 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-07-05 18:05:00 UTC |
| Updated | 2020-02-24 15:55:00 UTC |
| Description | The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Point-to-point Protocol Project | Point-to-point Protocol | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-1106-1 ppp | DEBIAN | www.debian.org | Patch, Vendor Advisory |
| usn/usn-310-1 - Ubuntu: Linux for human beings | UBUNTU | www.ubuntu.com | |
| Secunia - Advisories - Mandriva update for ppp | SECUNIA | secunia.com | Patch, Vendor Advisory |
| 26994 | OSVDB | www.osvdb.org | |
| Debian update for ppp - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | Patch, Vendor Advisory |
| ppp setuid Security Issue - Advisories - Secunia | SECUNIA | secunia.com | |
| Secunia - Advisories - Ubuntu update for ppp | SECUNIA | secunia.com | Patch, Vendor Advisory |
| PPPD Winbind Plugin Local Privilege Escalation Vulnerability | BID | www.securityfocus.com | Patch |
| Advisories - Mandriva Linux | MANDRIVA | www.mandriva.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2006-08-16 | Mark J Cox | Not vulnerable. The winbind plugin is not shipped with Red Hat Enterprise Linux 2.1, 3, or 4. |
There are currently no legacy QID mappings associated with this CVE.