Ubuntu 5.10 / 6.06 LTS : ppp vulnerability (USN-310-1)

Ubuntu Security Notice (C) 2006-2016 Canonical, Inc. / NASL script (C) 2007-2016 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related

Description :

Marcus Meissner discovered that the winbind plugin of pppd does not
check the result of the setuid() call. On systems that configure PAM
limits for the maximum number of user processes and enable the winbind
plugin, a local attacker could exploit this to execute the winbind
NTLM authentication helper as root. Depending on the local winbind
configuration, this could potentially lead to privilege escalation.

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected ppp, ppp-dev and / or ppp-udeb packages.

Risk factor :

High / CVSS Base Score : 7.2

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 27885 ()

Bugtraq ID:

CVE ID: CVE-2006-2194

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now