CVE-2004-1001
CVSS4.6
发布时间 :2005-03-01 00:00:00
修订时间 :2008-09-05 16:40:02
NMCOP    

[原文]Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.


[CNNVD]Shadow passwd_check函数 本地提权漏洞(CNNVD-200503-005)

        Shadow 4.0.4.1及可能的其他4.0.5之前版本的passwd_check函数中存在未知漏洞,在pam_chauthtok函数调用发生的错误未正确处理时,本地用户可以执行未经授权的活动。

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1001
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-1001
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200503-005
(官方数据源) CNNVD

- 其它链接及资源

http://xforce.iss.net/xforce/xfdb/17902
(VENDOR_ADVISORY)  XF  shadow-pwdcheck-modify-account(17902)
http://www.debian.org/security/2004/dsa-585
(UNKNOWN)  DEBIAN  DSA-585
http://secunia.com/advisories/13028
(UNKNOWN)  SECUNIA  13028
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000894
(UNKNOWN)  CONECTIVA  CLA-2004:894

- 漏洞信息

Shadow passwd_check函数 本地提权漏洞
中危 未知
2005-03-01 00:00:00 2006-08-24 00:00:00
本地  
        Shadow 4.0.4.1及可能的其他4.0.5之前版本的passwd_check函数中存在未知漏洞,在pam_chauthtok函数调用发生的错误未正确处理时,本地用户可以执行未经授权的活动。

- 公告与补丁

        

- 漏洞信息 (F34958)

dsa-585.txt (PacketStormID:F34958)
2004-11-10 00:00:00
 
advisory
linux,debian
CVE-2004-1001
[点击下载]

Debian Security Advisory 585-1 - A vulnerability has been discovered in the shadow suite which provides programs like chfn and chsh. It is possible for a user, who is logged in but has an expired password to alter his account information with chfn or chsh without having to change the password. The problem was originally thought to be more severe.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 585-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
November 5th, 2004                      http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : shadow
Vulnerability  : programming error
Problem-Type   : local
Debian-specific: no
CVE ID         : CAN-2004-1001

A vulnerability has been discovered in the shadow suite which provides
programs like chfn and chsh.  It is possible for a user, who is logged
in but has an expired password to alter his account information with
chfn or chsh without having to change the password.  The problem was
originally thought to be more severe.

For the stable distribution (woody) this problem has been fixed in
version 20000902-12woody1.

For the unstable distribution (sid) this problem has been fixed in
version 4.0.3-30.3.

We recommend that you upgrade your passwd package (from the shadow
suite).


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/s/shadow/shadow_20000902-12woody1.dsc
      Size/MD5 checksum:      639 0cf86eed97dc4d7e378828e2fe28e886
    http://security.debian.org/pool/updates/main/s/shadow/shadow_20000902-12woody1.diff.gz
      Size/MD5 checksum:    92075 5e6f576d4f073a114473126ce9e90c10
    http://security.debian.org/pool/updates/main/s/shadow/shadow_20000902.orig.tar.gz
      Size/MD5 checksum:   733922 b51537fa6f3f717d440b6f0cf95eab57

  Alpha architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_alpha.deb
      Size/MD5 checksum:   119920 a8cb335e5b64386c204c98664a2498bf
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_alpha.deb
      Size/MD5 checksum:   406874 e12a34689305388ff172511188b179a4

  ARM architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_arm.deb
      Size/MD5 checksum:   103790 87fe95eac228c211f551b3a4de8bb8a5
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_arm.deb
      Size/MD5 checksum:   272012 4a2cea7a31236ed7b0472f59edf01f4a

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_i386.deb
      Size/MD5 checksum:   103778 338095117a08787f51256fa2e86661c3
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_i386.deb
      Size/MD5 checksum:   275410 bd5487f119d3837150a4aee18ade236b

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_ia64.deb
      Size/MD5 checksum:   133494 bbd187d6fe4da8a8c503141e7c234802
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_ia64.deb
      Size/MD5 checksum:   507214 37128be0a49818afc7dd9fac3d0d2f88

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_hppa.deb
      Size/MD5 checksum:   109046 773cf097fbb1dcce39a23bd5be1f49e7
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_hppa.deb
      Size/MD5 checksum:   313074 ee019fbdbc733b59a0d0a71b82d05c66

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_m68k.deb
      Size/MD5 checksum:   101886 4d9a34f0172a44de4611b83c9c89f339
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_m68k.deb
      Size/MD5 checksum:   259036 20dba3b63116c50ed1e1480a5da34e10

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_mips.deb
      Size/MD5 checksum:   109012 6e50e2fa756270744ce99233e080d4c0
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_mips.deb
      Size/MD5 checksum:   368544 a7a3ad3c0a6bf2acf78e43f89ba7b428

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_mipsel.deb
      Size/MD5 checksum:   109206 b461b11835846033937877db49915aee
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_mipsel.deb
      Size/MD5 checksum:   366398 0a7d4f1b15b0088272160ffd68970374

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_powerpc.deb
      Size/MD5 checksum:   104674 92ad806fcbcfca0132a896af8c21398b
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_powerpc.deb
      Size/MD5 checksum:   281816 dfc1a214b13f9ef533597ab0ec5ecd27

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_s390.deb
      Size/MD5 checksum:   106168 3a6caf5db87e69943c3fe2b994b7789c
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_s390.deb
      Size/MD5 checksum:   280684 8a6144340a87b4abd7e127560e102499

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_sparc.deb
      Size/MD5 checksum:   111290 b5d5d9e3206785129372a89251c7ce8c
    http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_sparc.deb
      Size/MD5 checksum:   355378 73e7bc9e0445ead000db4523839462fe


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBi5VYW5ql+IAeqTIRAqYjAJ9E4KK9MEXZceO6UwI6cGd7fK/rPQCeMz8c
cB/UUQJ/2pAUPRnhC1FRz80=
=u6Jq
-----END PGP SIGNATURE-----

    

- 漏洞信息

11173
Shadow chfn/chsh Arbitrary Account Property Modification
Local Access Required Input Manipulation
Loss of Integrity
Exploit Unknown Vendor Verified

- 漏洞描述

Shadow chfn/chsh contain flaws that may allow a malicious user to modify their own account information. The issue is due to a validation error in the passwd_check() function in 'libmisc/pwdcheck.c'. It is possible that the flaw may allow unauthorized modifications to certain account properties such as full name or login shell, resulting in a loss of integrity.

- 时间线

2004-10-27 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 4.0.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站