Vulnerability Name: | CVE-2001-1175 (CCN-6851) | ||||||||
Assigned: | 2001-07-12 | ||||||||
Published: | 2001-07-12 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: MITRE Type: CNA CVE-2001-1175 Source: CCN Type: RHSA-2001-095 New util-linux packages available to fix vipw permissions problems Source: CCN Type: RHSA-2001-132 New util-linux packages available to fix /bin/login pam problem Source: CCN Type: OSVDB ID: 1904 util-linux vipw Encrypted Password Disclosure Source: REDHAT Type: Patch, Vendor Advisory RHSA-2001:095 Source: REDHAT Type: UNKNOWN RHSA-2001:132 Source: BID Type: Patch, Vendor Advisory 3036 Source: CCN Type: BID-3036 Vipw Insecure File Permissions Vulnerability Source: XF Type: UNKNOWN vipw-world-readable-files(6851) Source: XF Type: UNKNOWN vipw-world-readable-files(6851) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |