First published: Thu Mar 23 2006(Updated: )
opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 through 6.1-STABLE before 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root account and possibly gain root privileges if a root shell is permitted by the configuration of the wheel group or sshd.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.3-releng | |
FreeBSD Kernel | =4.1.1-stable | |
FreeBSD Kernel | =4.6-releng | |
FreeBSD Kernel | =4.8-release_p7 | |
FreeBSD Kernel | =5.4-releng | |
FreeBSD Kernel | =5.3-release | |
FreeBSD Kernel | =3.1 | |
FreeBSD Kernel | =4.1.1-release | |
FreeBSD Kernel | =3.0-releng | |
FreeBSD Kernel | =2.2.5 | |
FreeBSD Kernel | =5.1-releng | |
FreeBSD Kernel | =4.4-stable | |
FreeBSD Kernel | =5.3 | |
FreeBSD Kernel | =4.6-stable | |
FreeBSD Kernel | =4.6-release | |
FreeBSD Kernel | =5.1-release_p5 | |
FreeBSD Kernel | =4.3-stable | |
FreeBSD Kernel | =2.2.2 | |
FreeBSD Kernel | =4.7-stable | |
FreeBSD Kernel | =5.2.1-releng | |
FreeBSD Kernel | =2.1.7 | |
FreeBSD Kernel | =5.0-release_p14 | |
FreeBSD Kernel | =3.5-stable | |
FreeBSD Kernel | =2.2.3 | |
FreeBSD Kernel | =5.1-release | |
FreeBSD Kernel | =4.3-release_p38 | |
FreeBSD Kernel | =2.0.5 | |
FreeBSD Kernel | =4.5-stable | |
FreeBSD Kernel | =4.6-release_p20 | |
FreeBSD Kernel | =4.5-release | |
FreeBSD Kernel | =5.0-releng | |
FreeBSD Kernel | =1.1.5.1 | |
FreeBSD Kernel | =5.1-alpha | |
FreeBSD Kernel | =4.3-release | |
FreeBSD Kernel | =4.10-releng | |
FreeBSD Kernel | =4.7-releng | |
FreeBSD Kernel | =4.2-stable | |
FreeBSD Kernel | =4.5 | |
FreeBSD Kernel | =3.5.1 | |
FreeBSD Kernel | =4.4-release_p42 | |
FreeBSD Kernel | =4.7 | |
FreeBSD Kernel | =4.11-releng | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =2.2.8 | |
FreeBSD Kernel | =3.5.1-stable | |
FreeBSD Kernel | =4.10-release | |
FreeBSD Kernel | =4.4-releng | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.9-releng | |
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =4.7-release_p17 | |
FreeBSD Kernel | =4.9-pre-release | |
FreeBSD Kernel | =2.1.6.1 | |
FreeBSD Kernel | =2.2 | |
FreeBSD Kernel | =3.0 | |
FreeBSD Kernel | =4.8-pre-release | |
FreeBSD Kernel | =5.4-stable | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =3.2 | |
FreeBSD Kernel | =4.5-release_p32 | |
FreeBSD Kernel | =4.11-release_p3 | |
FreeBSD Kernel | =4.10-release_p8 | |
FreeBSD Kernel | =4.8 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =2.2.4 | |
FreeBSD Kernel | =2.1.0 | |
FreeBSD Kernel | =2.2.6 | |
FreeBSD Kernel | =2.1.6 | |
FreeBSD Kernel | =5.4-pre-release | |
FreeBSD Kernel | =2.1.7.1 | |
FreeBSD Kernel | =4.0-releng | |
FreeBSD Kernel | =3.3 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =6.0-release | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.6 | |
FreeBSD Kernel | =4.3 | |
FreeBSD Kernel | =4.10 | |
FreeBSD Kernel | =5.4-release | |
FreeBSD Kernel | =3.4 | |
FreeBSD Kernel | =3.5 | |
FreeBSD Kernel | =5.0-alpha | |
FreeBSD Kernel | =4.5-releng | |
FreeBSD Kernel | =5.2.1-release | |
FreeBSD Kernel | =4.8-releng | |
FreeBSD Kernel | =5.0 | |
FreeBSD Kernel | =2.1.5 | |
FreeBSD Kernel | =3.5.1-release | |
FreeBSD Kernel | =6.0-stable | |
FreeBSD Kernel | =5.3-stable | |
FreeBSD Kernel | =4.0-alpha | |
FreeBSD Kernel | =2.2.1 | |
FreeBSD Kernel | =4.7-release | |
FreeBSD Kernel | =4.9 | |
FreeBSD Kernel | =4.6.2 | |
FreeBSD Kernel | =2.2.7 | |
FreeBSD Kernel | =2.1-stable | |
FreeBSD Kernel | =2.0 | |
FreeBSD Kernel | =5.3-releng | |
FreeBSD Kernel | =4.11-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1283 is classified as a high severity vulnerability due to the potential for local users to gain root privileges.
To fix CVE-2006-1283, update your FreeBSD system to a patched version released after March 22, 2006.
CVE-2006-1283 affects FreeBSD versions from 4.10-RELEASE-p22 through 6.1-STABLE before the patch date.
CVE-2006-1283 is a local privilege escalation vulnerability, meaning it cannot be exploited remotely.
The potential impact of CVE-2006-1283 includes unauthorized access to the root account, leading to full system control.