Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-058: shadow


Vulnerability Assessment Details

RHSA-2003-058: shadow

Vulnerability Assessment Summary
Check for the version of the shadow packages

Detailed Explanation for this Vulnerability Assessment


Updated shadow-utils packages are now available. These updated packages
correct a bug that caused the useradd tool to create mail spools with
incorrect permissions.

The shadow-utils package includes programs for converting UNIX password
files to the shadow password format, plus programs for managing user and
group accounts. One of these programs is useradd, which is used to create
or update new user information.

When creating a user account, the version of useradd included in Red Hat
packages creates a mail spool file with incorrectly-set group ownership.
Instead of setting the file's group ownership to the "mail" group, it is
set to the user's primary group.

On systems where other users share the same primary group, this would permit
those users to be able to read and write other user mailboxes.

These errata packages contain an updated patch to useradd. Where a mail
group exists, mailboxes will be created with group mail having read and
write permissions. Otherwise the mailbox will be created without group
read and write permissions.

All users are advised to upgrade to these updated packages and also to
check the /var/spool/mail directory to ensure that mailboxes have correct
permissions.




Solution : http://rhn.redhat.com/errata/RHSA-2003-058.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

HP Procurve GIG-T SFP VL Module J9033A 20x Gigabit Ethernet Ports 4x SFP Ports
$75.0
HP Procurve GIG-T SFP VL Module J9033A 20x Gigabit Ethernet Ports 4x SFP Ports pictureJuniper SFPP-10GE-SR-B 10GB Ethernet SFP+ SR Multimode LC 740-031980
$195.0
Juniper SFPP-10GE-SR-B 10GB Ethernet SFP+ SR Multimode LC 740-031980 pictureCables On Demand SF-SFPP2EPASS-005, SFP+SFP+ Passive Twin Ax
$14.95
Cables On Demand SF-SFPP2EPASS-005, SFP+SFP+ Passive Twin Ax pictureDell PowerConnect 3524P 24 Port POE Gigabit Ethernet Switch (2 SFP) w/Rack Ears
$66.99
Dell PowerConnect 3524P 24 Port POE Gigabit Ethernet Switch (2 SFP) w/Rack Ears picture


Discussions

No Discussions have been posted on this vulnerability.