Shadow-Utils UserAdd 权限许可和访问控制问题漏洞

漏洞信息详情

Shadow-Utils UserAdd 权限许可和访问控制问题漏洞

漏洞简介

shadow-utils 4.0.3以及可能的4.0.8之前的其他版本中的useradd在创建新用户邮箱时,未提供用于打开函数的所需自变量,这会使邮箱以不可预测的权限创建,并可能使攻击者读取或修改邮箱。

漏洞公告

厂商已发布4.0.8 版本以解决此问题。

请参阅引用公告了解获取和应用修复补丁的更多信息。

SGI ProPack 3.0 SP6

shadow shadow 4.0.3

参考网址

来源:SECUNIA

链接:http://secunia.com/advisories/27706

来源:MANDRIVA

链接:http://www.mandriva.com/security/advisories?name=MDKSA-2006:090

来源:BID

链接:https://www.securityfocus.com/bid/18111

来源:BUGTRAQ

链接:http://www.securityfocus.com/archive/1/468336/100/0/threaded

来源:CERT-VN

链接:http://www.kb.cert.org/vuls/id/312692

来源:CONFIRM

链接:http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm

来源:OVAL

链接:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10807

来源:SECUNIA

链接:http://secunia.com/advisories/25629

来源:SECUNIA

链接:http://secunia.com/advisories/25894

来源:SECTRACK

链接:http://www.securitytracker.com/id?1018221

来源:SECUNIA

链接:http://secunia.com/advisories/25098

来源:XF

链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/26958

来源:SECUNIA

链接:http://secunia.com/advisories/25896

来源:GENTOO

链接:http://www.gentoo.org/security/en/glsa/glsa-200606-02.xml

来源:CONFIRM

链接:http://cvs.pld.org.pl/shadow/NEWS?rev=1.109

来源:SECUNIA

链接:http://secunia.com/advisories/26909

来源:SECUNIA

链接:http://secunia.com/advisories/20506

来源:CONFIRM

链接:https://issues.rpath.com/browse/RPL-1357

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2007-0431.html

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2007/3229

来源:FULLDISC

链接:http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html

来源:SECUNIA

链接:http://secunia.com/advisories/25267

来源:VUPEN

链接:http://www.vupen.com/english/advisories/2006/2006

来源:SECUNIA

链接:http://secunia.com/advisories/20370

来源:REDHAT

链接:http://www.redhat.com/support/errata/RHSA-2007-0276.html

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享