Executive Summary
Summary | |
---|---|
Title | New glibc packages fix information disclosure |
Informations | |||
---|---|---|---|
Name | DSA-1973 | First vendor Publication | 2010-01-19 |
Vendor | Debian | Last vendor Modification | 2010-01-19 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Christoph Pleger has discovered that the GNU C Library (aka glibc) and its derivatives add information from the passwd.adjunct.byname map to entries in the passwd map, which allows local users to obtain the encrypted passwords of NIS accounts by calling the getpwnam function. For the oldstable distribution (etch), this problem has been fixed in version 2.3.6.ds1-13etch10 of the glibc package. For the stable distribution (lenny), this problem has been fixed in version 2.7-18lenny2 of the glibc package. For the unstable distribution (sid) this problem has been fixed in version 2.10.2-4 of the eglibc package. We recommend that you upgrade your glibc or eglibc package. |
Original Source
Url : http://www.debian.org/security/2010/dsa-1973 |
Alert History
Date | Informations |
---|---|
2016-04-26 21:41:43 |
|
2014-02-17 11:29:09 |
|
2013-05-11 00:43:40 |
|