Lucene search

K
zdiThomas Chauchefoin (@swapgs) from Synacktiv (@Synacktiv)ZDI-20-980
HistoryAug 11, 2020 - 12:00 a.m.

Canonical Ubuntu Point-to-Point Protocol Daemon Arbitrary File Read Information Disclosure Vulnerability

2020-08-1100:00:00
Thomas Chauchefoin (@swapgs) from Synacktiv (@Synacktiv)
www.zerodayinitiative.com
20
vulnerability
local attackers
arbitrary files
canonical ubuntu
low-privileged code
environment variables
validation
user-supplied data
stored credentials

EPSS

0.001

Percentile

28.9%

This vulnerability allows local attackers to read arbitrary files on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of environment variables in pppd. The issue results from the lack of proper validation of user-supplied data, which can allow the read of arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.