First published: Mon Apr 01 2002(Updated: )
vipw in the util-linux package before 2.10 causes /etc/shadow to be world-readable in some cases, which would make it easier for local users to perform brute force password guessing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
util-linux | =2.10s | |
util-linux | =2.11d |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1175 has a medium severity rating due to the potential exposure of the /etc/shadow file which can facilitate brute force attacks.
To fix CVE-2001-1175, upgrade your util-linux package to a version newer than 2.11d.
CVE-2001-1175 affects versions of the util-linux package prior to 2.10 and includes specific versions like 2.10s and 2.11d.
If CVE-2001-1175 is exploited, local users could gain unauthorized access to password hashes, making it easier to perform brute force password guessing.
While CVE-2001-1175 was critical at the time, it is less relevant today due to the availability of newer software versions that fix the vulnerability.