First published: Mon Aug 12 2002(Updated: )
setpwnam.c in the util-linux package, as included in Red Hat Linux 7.3 and earlier, and other operating systems, does not properly lock a temporary file when modifying /etc/passwd, which may allow local users to gain privileges via a complex race condition that uses an open file descriptor in utility programs such as chfn and chsh.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mandrakesoft Mandrake Single Network Firewall | =7.2 | |
Mandrake Linux | =7.2 | |
Red Hat Linux | =6.1 | |
Mandrake Linux | =8.2 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =7.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.1 | |
Red Hat Linux | =7.2 | |
Mandrake Linux | =8.1 | |
Red Hat Linux | =6.2 | |
Mandriva Linux Corporate Server | =1.0.1 | |
Mandrake Linux | =7.1 | |
Red Hat Linux | =7.3 | |
HP Secure OS | =1.0 | |
Red Hat Linux | =7.0 | |
Red Hat Linux | =7.2 | |
Mandrake Linux | =8.1 | |
Red Hat Linux | =6.2 | |
Mandrake Linux | =8.0 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =7.1 | |
Red Hat Linux | =6.0 | |
Red Hat Linux | =6.0 | |
Mandrake Linux | =8.0 | |
Red Hat Linux | =7.2 | |
Red Hat Linux | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0638 is considered to have a low to medium severity due to its exploitation requiring a complex race condition.
To fix CVE-2002-0638, ensure you apply the appropriate patches or updates as provided by your operating system vendor.
CVE-2002-0638 affects various versions of Red Hat Linux, Mandrake Linux, and HP Secure OS.
Yes, local users may exploit CVE-2002-0638 through a race condition when modifying /etc/passwd.
No, CVE-2002-0638 is not classified as critical but can lead to privilege escalation under certain conditions.