Debian

Shadow

7 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.05%
  • Published 17.03.2021 06:15:12
  • Last modified 21.11.2024 03:22:25

The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence...

  • EPSS 0.06%
  • Published 03.12.2019 15:15:10
  • Last modified 21.11.2024 01:55:11

shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees

Exploit
  • EPSS 0.14%
  • Published 04.11.2019 19:15:10
  • Last modified 21.11.2024 00:05:25

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by...

  • EPSS 0.08%
  • Published 09.12.2008 00:30:00
  • Last modified 09.04.2025 00:30:58

/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp e...

  • EPSS 0.1%
  • Published 28.05.2006 23:02:00
  • Last modified 03.04.2025 01:03:51

useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and poss...

  • EPSS 0.07%
  • Published 19.04.2006 16:06:00
  • Last modified 03.04.2025 01:03:51

The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges.

  • EPSS 0.08%
  • Published 01.03.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.