CVE-2006-6683

Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:pedro_lineu_orso:chetcpasswd:*:*:*:*:*:*:*:*
cpe:2.3:a:pedro_lineu_orso:chetcpasswd:1.12:*:*:*:*:*:*:*
cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.1:*:*:*:*:*:*:*
cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:23

Type Values Removed Values Added
References () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 - Vendor Advisory () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=394454 - Vendor Advisory
References () http://www.securityfocus.com/bid/21102 - Vendor Advisory () http://www.securityfocus.com/bid/21102 - Vendor Advisory

Information

Published : 2006-12-21 19:28

Updated : 2025-04-09 00:30


NVD link : CVE-2006-6683

Mitre link : CVE-2006-6683

CVE.ORG link : CVE-2006-6683


JSON object : View

Products Affected

pedro_lineu_orso

  • chetcpasswd
CWE
CWE-264

Permissions, Privileges, and Access Controls