Advisory Details

August 11th, 2020

Canonical Ubuntu Point-to-Point Protocol Daemon Arbitrary File Read Information Disclosure Vulnerability

ZDI-20-980
ZDI-CAN-11504

CVE ID CVE-2020-15704
CVSS SCORE 5.5, AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AFFECTED VENDORS Canonical
AFFECTED PRODUCTS Ubuntu
VULNERABILITY DETAILS

This vulnerability allows local attackers to read arbitrary files on affected installations of Canonical Ubuntu. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

The specific flaw exists within the handling of environment variables in pppd. The issue results from the lack of proper validation of user-supplied data, which can allow the read of arbitrary files. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.

ADDITIONAL DETAILS

https://ubuntu.com/security/notices/USN-4451-1
https://ubuntu.com/security/notices/USN-4451-2


DISCLOSURE TIMELINE
  • 2020-07-22 - Vulnerability reported to vendor
  • 2020-08-11 - Coordinated public release of advisory
CREDIT Thomas Chauchefoin (@swapgs) from Synacktiv (@Synacktiv)
BACK TO ADVISORIES