Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-3378

Опубликовано: 06 июл. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

РелизСтатусПримечание
dapper

released

4.0.13-7ubuntu3.2
devel

released

4.0.16-2ubuntu4
edgy

released

4.0.16-2ubuntu4
feisty

released

4.0.16-2ubuntu4
upstream

needs-triage

Показывать по

EPSS

Процентиль: 17%
0.00056
Низкий

7.2 High

CVSS2

Связанные уязвимости

nvd
около 19 лет назад

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

debian
около 19 лет назад

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called ...

github
больше 3 лет назад

passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.

EPSS

Процентиль: 17%
0.00056
Низкий

7.2 High

CVSS2