Vulnerability Description
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Andries Brouwer | Util-Linux | 2.10s |
References
- http://www.redhat.com/support/errata/RHSA-2001-095.htmlPatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2001-132.html
- http://www.securityfocus.com/bid/3036PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6851
- http://www.redhat.com/support/errata/RHSA-2001-095.htmlPatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2001-132.html
- http://www.securityfocus.com/bid/3036PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6851
FAQ
What is CVE-2001-1175?
CVE-2001-1175 is a vulnerability with a CVSS score of 7.2 (HIGH). vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
How severe is CVE-2001-1175?
CVE-2001-1175 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1175?
Check the references section above for vendor advisories and patch information. Affected products include: Andries Brouwer Util-Linux.