[<prev] [next>] [day] [month] [year] [list]
Message-ID: <470e960c.I6ckQgS2g+Ow5h43%announce-noreply@rpath.com>
Date: Thu, 11 Oct 2007 17:30:52 -0400
From: rPath Update Announcements <announce-noreply@...th.com>
To: security-announce@...ts.rpath.com, update-announce@...ts.rpath.com
Cc: lwn@....net, full-disclosure@...ts.grok.org.uk, vulnwatch@...nwatch.org,
bugtraq@...urityfocus.com
Subject: rPSA-2007-0214-1 initscripts
rPath Security Advisory: 2007-0214-1
Published: 2007-10-11
Products: rPath Linux 1
Rating: Minor
Exposure Level Classification:
Local Information Exposure
Updated Versions:
initscripts=conary.rpath.com@rpl:1/8.12-8.10-1
rPath Issue Tracking System:
https://issues.rpath.com/browse/RPL-1825
Description:
Previous versions of the initscripts package do not set sufficiently
restrictive permissions on the /var/log/btmp file, leading to an
Information Exposure vulnerability in which users' passwords may be
revealed to unprivileged users in cases when the passwords have been
inadvertently entered as usernames at some login prompts.
Because sshd detects the incorrect permissions on /var/log/btmp and
thus does not log failed authentications (instead issuing a warning
about the file permissions to /var/log/secure), and gdm does not
log the user name, this vulnerability is generally limited to failed
logins at the system text console or over a local serial port.
Copyright 2007 rPath, Inc.
This file is distributed under the terms of the MIT License.
A copy is available at http://www.rpath.com/permanent/mit-license.html
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists