2 results (0.003 seconds)

CVSS: 2.1EPSS: 0%CPEs: 15EXPL: 0

Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer's warnings. Roaring Penguin pppoe, cuando se ejecuta con setuid root, no libera privilegios adecuadamente, lo que permite a usuarios locales sobreescribir ficheros arbitrarios. • http://marc.info/?l=bugtraq&m=110247119200510&w=2 http://marc.info/?l=bugtraq&m=110253341209450&w=2 http://www.debian.org/security/2004/dsa-557 http://www.fedoralegacy.org/updates/FC1/2005-11-14-FLSA_2005_152794__Updated_rp_pppoe_package_fixes_security_issue.html http://www.securityfocus.com/bid/11315 https://exchange.xforce.ibmcloud.com/vulnerabilities/17576 •

CVSS: 5.0EPSS: 4%CPEs: 5EXPL: 2

rp-pppoe PPPoE client allows remote attackers to cause a denial of service via the Clamp MSS option and a TCP packet with a zero-length TCP option. • https://www.exploit-db.com/exploits/20494 http://archives.neohapsis.com/archives/bugtraq/2000-12/0134.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000357 http://www.linux-mandrake.com/en/security/MDKSA-2000-084.php3 http://www.redhat.com/support/errata/RHSA-2000-130.html http://www.securityfocus.com/bid/2098 https://exchange.xforce.ibmcloud.com/vulnerabilities/5727 •