First published: Wed Dec 31 2003(Updated: )
chpass in OpenBSD 2.0 through 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =2.8 | |
OpenBSD | =3.1 | |
OpenBSD | =2.9 | |
OpenBSD | =2.1 | |
OpenBSD | =2.2 | |
OpenBSD | =2.0 | |
OpenBSD | =2.7 | |
OpenBSD | =3.2 | |
OpenBSD | =2.4 | |
OpenBSD | =2.3 | |
OpenBSD | =3.0 | |
OpenBSD | =2.5 | |
OpenBSD | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1366 is considered a moderate vulnerability because it allows local users to read arbitrary file contents.
To mitigate CVE-2003-1366, ensure that you apply the latest security patches for OpenBSD and restrict access rights to sensitive files.
CVE-2003-1366 affects OpenBSD versions from 2.0 through 3.2.
CVE-2003-1366 involves a hard link attack on a temporary file used by the chpass command.
Local users on affected OpenBSD systems are at risk from CVE-2003-1366, as it allows them to exploit the vulnerability.