Vulnerabilities > Debian > Shadow

DATE CVE VULNERABILITY TITLE RISK
2021-03-17 CVE-2017-20002 Improper Privilege Management vulnerability in Debian Linux and Shadow
The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty.
local
low complexity
debian CWE-269
4.6
2019-12-03 CVE-2013-4235 Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in multiple products
shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
local
high complexity
debian fedoraproject redhat CWE-367
4.7
2019-11-04 CVE-2005-4890 Improper Input Validation vulnerability in multiple products
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program".
local
low complexity
debian sudo-project redhat CWE-20
7.2
2011-02-19 CVE-2011-0721 Improper Input Validation vulnerability in Debian Shadow 1:4.1.4
Multiple CRLF injection vulnerabilities in (1) chfn and (2) chsh in shadow 1:4.1.4 allow local users to add new users or groups to /etc/passwd via the GECOS field.
network
low complexity
debian CWE-20
6.4
2008-12-09 CVE-2008-5394 Link Following vulnerability in Debian Shadow 4.0.18.1
/bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.
local
low complexity
debian CWE-59
7.2
2006-05-28 CVE-2006-1174 Permissions, Privileges, and Access Controls vulnerability in Debian Shadow
useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox.
local
high complexity
debian CWE-264
3.7
2006-04-19 CVE-2006-1844 Unspecified vulnerability in Debian Base-Config and Shadow
The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges.
local
low complexity
debian
2.1
2005-03-01 CVE-2004-1001 Unspecified vulnerability in Debian Shadow 4.0.4.1
Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.
local
low complexity
debian
4.6