Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-058: shadow


Vulnerability Assessment Details

RHSA-2003-058: shadow

Vulnerability Assessment Summary
Check for the version of the shadow packages

Detailed Explanation for this Vulnerability Assessment


Updated shadow-utils packages are now available. These updated packages
correct a bug that caused the useradd tool to create mail spools with
incorrect permissions.

The shadow-utils package includes programs for converting UNIX password
files to the shadow password format, plus programs for managing user and
group accounts. One of these programs is useradd, which is used to create
or update new user information.

When creating a user account, the version of useradd included in Red Hat
packages creates a mail spool file with incorrectly-set group ownership.
Instead of setting the file's group ownership to the "mail" group, it is
set to the user's primary group.

On systems where other users share the same primary group, this would permit
those users to be able to read and write other user mailboxes.

These errata packages contain an updated patch to useradd. Where a mail
group exists, mailboxes will be created with group mail having read and
write permissions. Otherwise the mailbox will be created without group
read and write permissions.

All users are advised to upgrade to these updated packages and also to
check the /var/spool/mail directory to ensure that mailboxes have correct
permissions.




Solution : http://rhn.redhat.com/errata/RHSA-2003-058.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Latest KNOPPIX LINUX Operating system PC repair Bootable live system Windows
$9.99
Latest KNOPPIX LINUX Operating system PC repair Bootable live system Windows  pictureKnoppix 7.2.0 Live Linux Bootable Startup CD (Runs form CD) +Free Retro Linux CD
$11.95
Knoppix 7.2.0 Live Linux Bootable Startup CD (Runs form CD) +Free Retro Linux CD picturePC REPAIR , KNOPPIX LINUX Operating system,BOOTABLE LIVE SYSTEM ON DVD WINDOWS
$7.95
PC REPAIR , KNOPPIX LINUX Operating system,BOOTABLE LIVE SYSTEM ON DVD WINDOWS picturePC REPAIR , KNOPPIX LINUX Operating system,BOOTABLE LIVE SYSTEM ON CD WINDOWS
$7.95
PC REPAIR , KNOPPIX LINUX Operating system,BOOTABLE LIVE SYSTEM ON CD WINDOWS picture


Discussions

No Discussions have been posted on this vulnerability.