- ------------------------------------------------------------------------- Debian Security Advisory DSA-4253-1 security@debian.org https://www.debian.org/security/ Salvatore Bonaccorso July 23, 2018 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : network-manager-vpnc CVE ID : CVE-2018-10900 Debian Bug : 904255 Denis Andzakovic discovered that network-manager-vpnc, a plugin to provide VPNC support for NetworkManager, is prone to a privilege escalation vulnerability. A newline character can be used to inject a Password helper parameter into the configuration data passed to vpnc, allowing a local user with privileges to modify a system connection to execute arbitrary commands as root. For the stable distribution (stretch), this problem has been fixed in version 1.2.4-4+deb9u1. We recommend that you upgrade your network-manager-vpnc packages. For the detailed security status of network-manager-vpnc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/network-manager-vpnc Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org