USN-17-1: passwd vulnerability

Publication date

5 November 2004

Overview

passwd vulnerability

Releases


Details

Martin Schulze and Steve Grubb discovered a flaw in the authentication
input validation of the "chfn" and "chsh" programs. This allowed
logged in users with an expired password to change their real name and
their login shell without having to change their password.

This flaw cannot lead to privilege escalation and does not allow to
modify account properties of other users, so the impact is relatively
low.

Martin Schulze and Steve Grubb discovered a flaw in the authentication
input validation of the "chfn" and "chsh" programs. This allowed
logged in users with an expired password to change their real name and
their login shell without having to change their password.

This flaw cannot lead to privilege escalation and does not allow to
modify account properties of other users, so the impact is relatively
low.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
4.10 warty login – 

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›