CVE-2006-3378 Affecting shadow package, versions <1:4.0.14-1
Threat Intelligence
EPSS
0.06% (27th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN11-SHADOW-524557
- published 6 Jul 2006
- disclosed 6 Jul 2006
Introduced: 6 Jul 2006
CVE-2006-3378 Open this link in a new tabHow to fix?
Upgrade Debian:11
shadow
to version 1:4.0.14-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream shadow
package and not the shadow
package as distributed by Debian
.
See How to fix?
for Debian:11
relevant fixed versions and status.
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
References
- https://security-tracker.debian.org/tracker/CVE-2006-3378
- http://www.debian.org/security/2006/dsa-1150
- http://secunia.com/advisories/20950
- http://secunia.com/advisories/20966
- http://secunia.com/advisories/21480
- http://www.securityfocus.com/bid/18850
- http://www.ubuntu.com/usn/usn-308-1
- http://www.osvdb.org/26995
CVSS Scores
version 3.1