Vulnerabilities > CVE-2001-0195 - Improper Preservation of Permissions vulnerability in Debian Linux 2.2
Attack vector
LOCAL Attack complexity
LOW Privileges required
LOW Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
sash before 3.4-4 in Debian GNU/Linux does not properly clone /etc/shadow, which makes it world-readable and could allow local users to gain privileges via password cracking.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 1 |
Common Weakness Enumeration (CWE)
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-015.NASL |
description | Versions of the sash package prior to 3.4-4 did not clone /etc/shadow properly, causing it to be made world-readable. This package only exists in stable, so if you are running unstable you won |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 14852 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/14852 |
title | Debian DSA-015-1 : sash - broken maintainer script |