Vulnerabilities (CVE)

Filtered by vendor Debian Subscribe
Filtered by product Shadow
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2004-1001 1 Debian 1 Shadow 2020-08-11 4.6 MEDIUM N/A
Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.
CVE-2006-1174 1 Debian 1 Shadow 2020-08-11 3.7 LOW N/A
useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox.
CVE-2006-1844 1 Debian 2 Base-config, Shadow 2020-08-11 2.1 LOW N/A
The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges.
CVE-2008-5394 1 Debian 1 Shadow 2018-10-11 7.2 HIGH N/A
/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.
CVE-2011-0721 1 Debian 1 Shadow 2017-08-17 6.4 MEDIUM N/A
Multiple CRLF injection vulnerabilities in (1) chfn and (2) chsh in shadow 1:4.1.4 allow local users to add new users or groups to /etc/passwd via the GECOS field.