Debian: shadow unintended behaviour fix

    Date05 Nov 2004
    CategoryDebian
    2342
    Posted ByLinuxSecurity Advisories
    A vulnerability has been discovered in the shadow suite which provides programs like chfn and chsh. It is possible for a user, who is logged in but has an expired password to alter his account information with chfn or chsh without having to change the password. The problem was originally thought to be more severe.
    
    --------------------------------------------------------------------------
    Debian Security Advisory DSA 585-1                     This email address is being protected from spambots. You need JavaScript enabled to view it. 
    http://www.debian.org/security/                             Martin Schulze
    November 5th, 2004                       http://www.debian.org/security/faq
    --------------------------------------------------------------------------
    
    Package        : shadow
    Vulnerability  : programming error
    Problem-Type   : local
    Debian-specific: no
    CVE ID         : CAN-2004-1001
    
    A vulnerability has been discovered in the shadow suite which provides
    programs like chfn and chsh.  It is possible for a user, who is logged
    in but has an expired password to alter his account information with
    chfn or chsh without having to change the password.  The problem was
    originally thought to be more severe.
    
    For the stable distribution (woody) this problem has been fixed in
    version 20000902-12woody1.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 4.0.3-30.3.
    
    We recommend that you upgrade your passwd package (from the shadow
    suite).
    
    
    Upgrade Instructions
    --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    --------------------------------
    
      Source archives:
    
         http://security.debian.org/pool/updates/main/s/shadow/shadow_20000902-12woody1.dsc
          Size/MD5 checksum:      639 0cf86eed97dc4d7e378828e2fe28e886
         http://security.debian.org/pool/updates/main/s/shadow/shadow_20000902-12woody1.diff.gz
          Size/MD5 checksum:    92075 5e6f576d4f073a114473126ce9e90c10
         http://security.debian.org/pool/updates/main/s/shadow/shadow_20000902.orig.tar.gz
          Size/MD5 checksum:   733922 b51537fa6f3f717d440b6f0cf95eab57
    
      Alpha architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_alpha.deb
          Size/MD5 checksum:   119920 a8cb335e5b64386c204c98664a2498bf
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_alpha.deb
          Size/MD5 checksum:   406874 e12a34689305388ff172511188b179a4
    
      ARM architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_arm.deb
          Size/MD5 checksum:   103790 87fe95eac228c211f551b3a4de8bb8a5
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_arm.deb
          Size/MD5 checksum:   272012 4a2cea7a31236ed7b0472f59edf01f4a
    
      Intel IA-32 architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_i386.deb
          Size/MD5 checksum:   103778 338095117a08787f51256fa2e86661c3
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_i386.deb
          Size/MD5 checksum:   275410 bd5487f119d3837150a4aee18ade236b
    
      Intel IA-64 architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_ia64.deb
          Size/MD5 checksum:   133494 bbd187d6fe4da8a8c503141e7c234802
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_ia64.deb
          Size/MD5 checksum:   507214 37128be0a49818afc7dd9fac3d0d2f88
    
      HP Precision architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_hppa.deb
          Size/MD5 checksum:   109046 773cf097fbb1dcce39a23bd5be1f49e7
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_hppa.deb
          Size/MD5 checksum:   313074 ee019fbdbc733b59a0d0a71b82d05c66
    
      Motorola 680x0 architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_m68k.deb
          Size/MD5 checksum:   101886 4d9a34f0172a44de4611b83c9c89f339
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_m68k.deb
          Size/MD5 checksum:   259036 20dba3b63116c50ed1e1480a5da34e10
    
      Big endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_mips.deb
          Size/MD5 checksum:   109012 6e50e2fa756270744ce99233e080d4c0
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_mips.deb
          Size/MD5 checksum:   368544 a7a3ad3c0a6bf2acf78e43f89ba7b428
    
      Little endian MIPS architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_mipsel.deb
          Size/MD5 checksum:   109206 b461b11835846033937877db49915aee
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_mipsel.deb
          Size/MD5 checksum:   366398 0a7d4f1b15b0088272160ffd68970374
    
      PowerPC architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_powerpc.deb
          Size/MD5 checksum:   104674 92ad806fcbcfca0132a896af8c21398b
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_powerpc.deb
          Size/MD5 checksum:   281816 dfc1a214b13f9ef533597ab0ec5ecd27
    
      IBM S/390 architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_s390.deb
          Size/MD5 checksum:   106168 3a6caf5db87e69943c3fe2b994b7789c
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_s390.deb
          Size/MD5 checksum:   280684 8a6144340a87b4abd7e127560e102499
    
      Sun Sparc architecture:
    
         http://security.debian.org/pool/updates/main/s/shadow/login_20000902-12woody1_sparc.deb
          Size/MD5 checksum:   111290 b5d5d9e3206785129372a89251c7ce8c
         http://security.debian.org/pool/updates/main/s/shadow/passwd_20000902-12woody1_sparc.deb
          Size/MD5 checksum:   355378 73e7bc9e0445ead000db4523839462fe
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    ---------------------------------------------------------------------------------
    For apt-get: deb  http://security.debian.org/ stable/updates main
    For dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and  http://packages.debian.org/
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":55.56,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.