Executive Summary

Summary
Title Ubuntu 5.10 installer password disclosure
Informations
Name USN-262-1 First vendor Publication 2006-03-12
Vendor Ubuntu Last vendor Modification 2006-03-12
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 7.2 Attack Range Local
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects the following Ubuntu releases:

Ubuntu 5.10 (Breezy Badger)

The following packages are affected:

base-config passwd

The problem can be corrected by upgrading the affected package to version 2.67ubuntu20 (base-config) and 1:4.0.3-37ubuntu8 (passwd). In general, a standard system upgrade is sufficient to effect the necessary changes.

Details follow:

Karl Øie discovered that the Ubuntu 5.10 installer failed to clean passwords in the installer log files. Since these files were world-readable, any local user could see the password of the first user account, which has full sudo privileges by default.

The updated packages remove the passwords and additionally make the log files readable only by root.

This does not affect the Ubuntu 4.10, 5.04, or the upcoming 6.04 installer. However, if you upgraded from Ubuntu 5.10 to the current development version of Ubuntu 6.04 ('Dapper Drake'), please ensure that you upgrade the passwd package to version 1:4.0.13-7ubuntu2 to fix the installer log files.

Original Source

Url : http://www.ubuntu.com/usn/USN-262-1

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

Open Source Vulnerability Database (OSVDB)

Id Description
23868 Ubuntu Installer Log File Cleartext Password Disclosure

The Ubunto installer contains a flaw that may lead to an unauthorized password exposure. The installer log files fail to sanitize passwords used during the installation. The installer log files are world-readable, thus any local user can see the password of the first user account, which has full sudo privileges by default, thus leading to a loss of confidentiality.

Nessus® Vulnerability Scanner

Date Description
2006-03-13 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-262-1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 12:03:21
  • Multiple Updates