CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
28.9%
Thomas Chauchefoin working with Trend Micro´s Zero Day Initiative,
discovered that ppp incorrectly handled module loading. A local attacker
could use this issue to load arbitrary kernel modules and possibly execute
arbitrary code.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 20.04 | noarch | ppp | < 2.4.7-2+4.1ubuntu5.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | ppp-dbgsym | < 2.4.7-2+4.1ubuntu5.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | ppp-dev | < 2.4.7-2+4.1ubuntu5.1 | UNKNOWN |
Ubuntu | 20.04 | noarch | ppp-udeb | < 2.4.7-2+4.1ubuntu5.1 | UNKNOWN |
Ubuntu | 18.04 | noarch | ppp | < 2.4.7-2+2ubuntu1.3 | UNKNOWN |
Ubuntu | 18.04 | noarch | ppp-dbgsym | < 2.4.7-2+2ubuntu1.3 | UNKNOWN |
Ubuntu | 18.04 | noarch | ppp-dev | < 2.4.7-2+2ubuntu1.3 | UNKNOWN |
Ubuntu | 18.04 | noarch | ppp-udeb | < 2.4.7-2+2ubuntu1.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | ppp | < 2.4.7-1+2ubuntu1.16.04.3 | UNKNOWN |
Ubuntu | 16.04 | noarch | ppp-dbgsym | < 2.4.7-1+2ubuntu1.16.04.3 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
28.9%