{"api_version":"1","generated_at":"2026-04-23T14:43:40+00:00","cve":"CVE-2006-2194","urls":{"html":"https://cve.report/CVE-2006-2194","api":"https://cve.report/api/cve/CVE-2006-2194.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-2194","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-2194"},"summary":{"title":"CVE-2006-2194","description":"The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.","state":"PUBLISHED","assigner":"debian","published_at":"2006-07-05 18:05:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.2","severity":"","vector":"AV:L/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://www.debian.org/security/2006/dsa-1106","name":"http://www.debian.org/security/2006/dsa-1106","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Debian -- Security Information -- DSA-1106-1 ppp","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:119","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:119","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20987","name":"http://secunia.com/advisories/20987","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Mandriva update for ppp","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/18849","name":"http://www.securityfocus.com/bid/18849","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"PPPD Winbind Plugin Local Privilege Escalation Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/advisories/20996","name":"http://secunia.com/advisories/20996","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Debian update for ppp - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20967","name":"http://secunia.com/advisories/20967","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Ubuntu update for ppp","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20963","name":"http://secunia.com/advisories/20963","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ppp setuid Security Issue - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/26994","name":"http://www.osvdb.org/26994","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.ubuntu.com/usn/usn-310-1","name":"http://www.ubuntu.com/usn/usn-310-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"usn/usn-310-1 - Ubuntu: Linux for human beings","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-2194","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-2194","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"2194","vulnerable":"1","versionEndIncluding":"2.4.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"point-to-point_protocol_project","cpe5":"point-to-point_protocol","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-2194","organization":"Red Hat","lastmodified":"2006-08-16","contributor":"Mark J Cox","statementText":"Not vulnerable. The winbind plugin is not shipped with Red Hat Enterprise Linux 2.1, 3, or 4.","cve_year":"2006","cve_id":"2194","crc32":"88e9f47d"}],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"2194","cve":"CVE-2006-2194","epss":"0.000550000","percentile":"0.171140000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:43:28.569Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"MDKSA-2006:119","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:119"},{"name":"26994","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/26994"},{"name":"DSA-1106","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1106"},{"name":"20963","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20963"},{"name":"20987","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20987"},{"name":"20996","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20996"},{"name":"20967","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20967"},{"name":"18849","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/18849"},{"name":"USN-310-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-310-1"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-07-05T00:00:00.000Z","descriptions":[{"lang":"en","value":"The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2006-07-11T09:00:00.000Z","orgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","shortName":"debian"},"references":[{"name":"MDKSA-2006:119","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:119"},{"name":"26994","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/26994"},{"name":"DSA-1106","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1106"},{"name":"20963","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20963"},{"name":"20987","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20987"},{"name":"20996","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20996"},{"name":"20967","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20967"},{"name":"18849","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/18849"},{"name":"USN-310-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-310-1"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@debian.org","ID":"CVE-2006-2194","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"MDKSA-2006:119","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:119"},{"name":"26994","refsource":"OSVDB","url":"http://www.osvdb.org/26994"},{"name":"DSA-1106","refsource":"DEBIAN","url":"http://www.debian.org/security/2006/dsa-1106"},{"name":"20963","refsource":"SECUNIA","url":"http://secunia.com/advisories/20963"},{"name":"20987","refsource":"SECUNIA","url":"http://secunia.com/advisories/20987"},{"name":"20996","refsource":"SECUNIA","url":"http://secunia.com/advisories/20996"},{"name":"20967","refsource":"SECUNIA","url":"http://secunia.com/advisories/20967"},{"name":"18849","refsource":"BID","url":"http://www.securityfocus.com/bid/18849"},{"name":"USN-310-1","refsource":"UBUNTU","url":"http://www.ubuntu.com/usn/usn-310-1"}]}}}},"cveMetadata":{"assignerOrgId":"79363d38-fa19-49d1-9214-5f28da3f3ac5","assignerShortName":"debian","cveId":"CVE-2006-2194","datePublished":"2006-07-05T18:00:00.000Z","dateReserved":"2006-05-04T00:00:00.000Z","dateUpdated":"2024-08-07T17:43:28.569Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-07-05 18:05:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:point-to-point_protocol_project:point-to-point_protocol:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4.4","matchCriteriaId":"9509E7EC-0930-4A75-A2E5-18D8A5F50946"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"2194","Ordinal":"1","Title":"CVE-2006-2194","CVE":"CVE-2006-2194","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"2194","Ordinal":"1","NoteData":"The winbind plugin in pppd for ppp 2.4.4 and earlier does not check the return code from the setuid function call, which might allow local users to gain privileges by causing setuid to fail, such as exceeding PAM limits for the maximum number of user processes, which prevents the winbind NTLM authentication helper from dropping privileges.","Type":"Description","Title":"CVE-2006-2194"},{"CveYear":"2006","CveId":"2194","Ordinal":"2","NoteData":"2006-07-05","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"2194","Ordinal":"3","NoteData":"2006-07-11","Type":"Other","Title":"Modified"}]}}}