Lucene search

K
zdiThomas Chauchefoin (@swapgs) from Synacktiv (@Synacktiv)ZDI-20-980
HistoryAug 11, 2020 - 12:00 a.m.

Canonical Ubuntu Point-to-Point Protocol Daemon Arbitrary File Read Information Disclosure Vulnerability

2020-08-1100:00:00
Thomas Chauchefoin (@swapgs) from Synacktiv (@Synacktiv)
www.zerodayinitiative.com
17

0.0004 Low

EPSS

Percentile

15.9%

This vulnerability allows local attackers to read arbitrary files on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of environment variables in pppd. The issue results from the lack of proper validation of user-supplied data, which can allow the read of arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.