Executive Summary
Summary | |
---|---|
Title | shadow vulnerability |
Informations | |||
---|---|---|---|
Name | USN-695-1 | First vendor Publication | 2008-12-18 |
Vendor | Ubuntu | Last vendor Modification | 2008-12-18 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects the following Ubuntu releases: Ubuntu 6.06 LTS Ubuntu 7.10 Ubuntu 8.04 LTS Ubuntu 8.10 This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu. The problem can be corrected by upgrading your system to the following package versions: Ubuntu 6.06 LTS: Ubuntu 7.10: Ubuntu 8.04 LTS: Ubuntu 8.10: In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Paul Szabo discovered a race condition in login. While setting up tty permissions, login did not correctly handle symlinks. If a local attacker were able to gain control of the system utmp file, they could cause login to change the ownership and permissions on arbitrary files, leading to a root privilege escalation. |
Original Source
Url : http://www.ubuntu.com/usn/USN-695-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-59 | Improper Link Resolution Before File Access ('Link Following') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:13625 | |||
Oval ID: | oval:org.mitre.oval:def:13625 | ||
Title: | DSA-1709-1 shadow -- race condition | ||
Description: | Paul Szabo discovered that login, the system login tool, did not correctly handle symlinks while setting up tty permissions. If a local attacker were able to gain control of the system utmp file, they could cause login to change the ownership and permissions on arbitrary files, leading to a root privilege escalation. For the stable distribution, this problem has been fixed in version 4.0.18.1-7+etch1. For the unstable distribution, this problem has been fixed in version 4.1.1-6. We recommend that you upgrade your shadow package. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1709-1 CVE-2008-5394 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | shadow |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:17685 | |||
Oval ID: | oval:org.mitre.oval:def:17685 | ||
Title: | USN-695-1 -- shadow vulnerability | ||
Description: | Paul Szabo discovered a race condition in login. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-695-1 CVE-2008-5394 | Version: | 5 |
Platform(s): | Ubuntu 6.06 Ubuntu 7.10 Ubuntu 8.04 Ubuntu 8.10 | Product(s): | shadow |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:7801 | |||
Oval ID: | oval:org.mitre.oval:def:7801 | ||
Title: | DSA-1709 shadow -- race condition | ||
Description: | Paul Szabo discovered that login, the system login tool, did not correctly handle symlinks while setting up tty permissions. If a local attacker were able to gain control of the system utmp file, they could cause login to change the ownership and permissions on arbitrary files, leading to a root privilege escalation. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1709 CVE-2008-5394 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | shadow |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2009-03-23 | Name : Ubuntu Update for shadow vulnerability USN-695-1 File : nvt/gb_ubuntu_USN_695_1.nasl |
2009-03-13 | Name : Gentoo Security Advisory GLSA 200903-24 (shadow) File : nvt/glsa_200903_24.nasl |
2009-03-07 | Name : Mandrake Security Advisory MDVSA-2009:062 (shadow-utils) File : nvt/mdksa_2009_062.nasl |
2009-01-26 | Name : Debian Security Advisory DSA 1709-1 (shadow) File : nvt/deb_1709_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
50651 | shadow on Debian GNU/Linux /bin/login utmp Users Temporary File Symlink Arbit... |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-04-23 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2009-062.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-695-1.nasl - Type : ACT_GATHER_INFO |
2009-03-11 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200903-24.nasl - Type : ACT_GATHER_INFO |
2009-01-21 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1709.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 12:05:33 |
|