|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-058: shadow Vulnerability Assessment Details
|
RHSA-2003-058: shadow |
||
Check for the version of the shadow packages Detailed Explanation for this Vulnerability Assessment Updated shadow-utils packages are now available. These updated packages correct a bug that caused the useradd tool to create mail spools with incorrect permissions. The shadow-utils package includes programs for converting UNIX password files to the shadow password format, plus programs for managing user and group accounts. One of these programs is useradd, which is used to create or update new user information. When creating a user account, the version of useradd included in Red Hat packages creates a mail spool file with incorrectly-set group ownership. Instead of setting the file's group ownership to the "mail" group, it is set to the user's primary group. On systems where other users share the same primary group, this would permit those users to be able to read and write other user mailboxes. These errata packages contain an updated patch to useradd. Where a mail group exists, mailboxes will be created with group mail having read and write permissions. Otherwise the mailbox will be created without group read and write permissions. All users are advised to upgrade to these updated packages and also to check the /var/spool/mail directory to ensure that mailboxes have correct permissions. Solution : http://rhn.redhat.com/errata/RHSA-2003-058.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
SanDisk 2TB Ultra 3D NAND SSD, Internal Solid State Drive - SDSSDH3-2T00-G26
$149.99
P13695-B21 HPE 2TB NVMe x4 RI SCN 2.5'' DS SSD P45631-001 P10591-002 **Retail**
$399.00
SanDisk 2TB Ultra 3D NAND SSD, Internal Solid State Drive - SDSSDH3-2T00-G25
$129.99
P13697-B21 HPE 4TB NVMe x4 RI SCN 2.5'' SSD P45632-001 P10591-001 **Retail Box**
$469.00
Patriot P210 128GB 256GB 512GB 1TB 2TB 2.5" SATA 3 6GB/s Internal SSD PC/MAC Lot
$14.99
Intel DC S3510 Series 120GB SSD 2.5" 6Gb/s SATA Solid State Drive SSDSC2BB120G6K
$9.99
Netac 1TB 2TB 512GB Internal SSD 2.5'' SATA III 6Gb/s Solid State Drive lot
$13.99
Fanxiang SSD 512GB 1TB 2TB 4TB 2.5'' SSD SATA III Internal Solid State Drive lot
$13.99
Fanxiang 256GB 512GB 1TB 2TB 4TB Internal SSD 2.5" SATA III 6GB/s for PC/MAC Lot
$188.09
Fanxiang 4TB 2TB 1TB SSD 550MB/s 2.5'' SATA III Internal Solid State Drive lot
$209.99
|
||
No Discussions have been posted on this vulnerability. |