First published: Fri Nov 19 2004(Updated: )
Roaring Penguin pppoe (rp-ppoe), if installed or configured to run setuid root contrary to its design, allows local users to overwrite arbitrary files. NOTE: the developer has publicly disputed the claim that this is a vulnerability because pppoe "is NOT designed to run setuid-root." Therefore this identifier applies *only* to those configurations and installations under which pppoe is run setuid root despite the developer's warnings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Roaring Penguin pppoe | =3.5 | |
Roaring Penguin pppoe | =3.0 | |
Roaring Penguin pppoe | =3.3 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 | |
Debian Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.