Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2002:047: util-linux

Vulnerability Assessment Details

MDKSA-2002:047: util-linux

Vulnerability Assessment Summary
Check for the version of the util-linux package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2002:047 (util-linux).

Michal Zalewski found a vulnerability in the util-linux package with the chfn
utility. This utility permits users to modify some information in the /etc/passwd
file, and is installed setuid root. Using a carefully crafted attack sequence,
a possible hacker can exploit a complex file locking and modification race that would
permit them to make changes to the /etc/passwd file. To successfully exploit this
vulnerability and obtain privilege escalation, there is a need for some
administrator interaction, and the password file must over over 4kb in size
attacker's entry cannot be in the last 4kb of the file.

Solution :
Network Security Threat Level: High

Networks Security ID: 5344

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors


No Discussions have been posted on this vulnerability.