Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-058: shadow


Vulnerability Assessment Details

RHSA-2003-058: shadow

Vulnerability Assessment Summary
Check for the version of the shadow packages

Detailed Explanation for this Vulnerability Assessment


Updated shadow-utils packages are now available. These updated packages
correct a bug that caused the useradd tool to create mail spools with
incorrect permissions.

The shadow-utils package includes programs for converting UNIX password
files to the shadow password format, plus programs for managing user and
group accounts. One of these programs is useradd, which is used to create
or update new user information.

When creating a user account, the version of useradd included in Red Hat
packages creates a mail spool file with incorrectly-set group ownership.
Instead of setting the file's group ownership to the "mail" group, it is
set to the user's primary group.

On systems where other users share the same primary group, this would permit
those users to be able to read and write other user mailboxes.

These errata packages contain an updated patch to useradd. Where a mail
group exists, mailboxes will be created with group mail having read and
write permissions. Otherwise the mailbox will be created without group
read and write permissions.

All users are advised to upgrade to these updated packages and also to
check the /var/spool/mail directory to ensure that mailboxes have correct
permissions.




Solution : http://rhn.redhat.com/errata/RHSA-2003-058.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

HP ZBook 17 G3 E3-1535m Motherboard 848306-001 Apw70 La-c391p
$499.99
HP ZBook 17 G3 E3-1535m Motherboard 848306-001 Apw70 La-c391p picture1PC NEW Mitsubishi servo motor HC-AQ0336BS-S8 (by DHL or EMS) #LMZ
$572.0
1PC NEW  Mitsubishi servo motor HC-AQ0336BS-S8   (by DHL or EMS) #LMZ pictureA55 Desktop Computer Mainboard USB 2.0 HDMI Interface for GA S3P DDR3 Socket
$52.75
A55 Desktop Computer Mainboard USB 2.0 HDMI Interface for GA S3P DDR3 Socket pictureSP-586TB Motherboard Manual with Drivers
$9.99
SP-586TB Motherboard Manual with Drivers picture


Discussions

No Discussions have been posted on this vulnerability.