CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:L/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
5.1%
Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe “is NOT designed to run setuid-root.” Therefore this identifier applies only to those configurations and installations under which pppoe is run setuid root despite the developer’s warnings.
Vendor | Product | Version | CPE |
---|---|---|---|
roaring_penguin | pppoe | 3.0 | cpe:2.3:a:roaring_penguin:pppoe:3.0:*:*:*:*:*:*:* |
roaring_penguin | pppoe | 3.3 | cpe:2.3:a:roaring_penguin:pppoe:3.3:*:*:*:*:*:*:* |
roaring_penguin | pppoe | 3.5 | cpe:2.3:a:roaring_penguin:pppoe:3.5:*:*:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:* |
debian | debian_linux | 3.0 | cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:* |
marc.info/?l=bugtraq&m=110247119200510&w=2
marc.info/?l=bugtraq&m=110253341209450&w=2
www.debian.org/security/2004/dsa-557
www.fedoralegacy.org/updates/FC1/2005-11-14-FLSA_2005_152794__Updated_rp_pppoe_package_fixes_security_issue.html
www.securityfocus.com/bid/11315
exchange.xforce.ibmcloud.com/vulnerabilities/17576