CVE-2012-5644
https://notcve.org/view.php?id=CVE-2012-5644
libuser has information disclosure when moving user's home directory libuser, presenta una divulgación de información cuando se mueve el directorio de inicio de usuario. • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102068.html https://access.redhat.com/security/cve/cve-2012-5644 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5644 https://security-tracker.debian.org/tracker/CVE-2012-5644 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2012-5630
https://notcve.org/view.php?id=CVE-2012-5630
libuser 0.56 and 0.57 has a TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees. libuser versiones 0.56 y 0.57, presenta una condición de carrera TOCTOU (de tiempo de comprobación y de tiempo de uso) cuando se copia y elimina árboles de directorios. • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/102068.html https://access.redhat.com/security/cve/cve-2012-5630 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-5630 https://security-tracker.debian.org/tracker/CVE-2012-5630 https://www.securityfocus.com/bid/59285 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •
CVE-2015-3246 – Libuser Library - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2015-3246
libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, directly modifies /etc/passwd, which allows local users to cause a denial of service (inconsistent file state) by causing an error during the modification. NOTE: this issue can be combined with CVE-2015-3245 to gain privileges. Vulnerabilidad en libuser en versiones anteriores 0.56.13-8 y 0.60 en versiones anteriores a 0.60.7, tal como se utiliza en el programa userhelper en el paquete usermode, modifica directamente /etc/passwd, lo que permite a usuarios locales provocar una denegación de servicio (estado de archivo inconsistente) causando un error durante la modificación. NOTA: este problema se puede combinar con CVE-2015-3245 para obtener privilegios. A flaw was found in the way the libuser library handled the /etc/passwd file. • https://www.exploit-db.com/exploits/37706 https://www.exploit-db.com/exploits/44633 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163044.html http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162947.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00000.html http://rhn.redhat.com/errata/RHSA-2015-1482.html http://rhn.redhat.com/errata/RHSA-2015-1483.html http://www.securityfocus.com/bid/76022 http://www.securitytracker.com/ • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-3245 – Libuser Library - Multiple Vulnerabilities
https://notcve.org/view.php?id=CVE-2015-3245
Incomplete blacklist vulnerability in the chfn function in libuser before 0.56.13-8 and 0.60 before 0.60-7, as used in the userhelper program in the usermode package, allows local users to cause a denial of service (/etc/passwd corruption) via a newline character in the GECOS field. Vulnerabilidad de lista negra incompleta en la función chfn en libuser en versiones anteriores a 0.56.13-8 y 0.60 en versiones anteriores a 0.60-7, tal como se utiliza en el programa userhelp en el paquete usermode, permite a usuarios locales provocar una denegación de servicio (/etc/passwd corruption) a través de un caracter de nueva línea en el campo GECOS. It was found that libuser, as used by the chfn userhelper functionality, did not properly filter out newline characters in GECOS fields. A local, authenticated user could use this flaw to corrupt the /etc/passwd file, resulting in a denial-of-service on the system. • https://www.exploit-db.com/exploits/37706 https://www.exploit-db.com/exploits/44633 http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163044.html http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162947.html http://rhn.redhat.com/errata/RHSA-2015-1482.html http://rhn.redhat.com/errata/RHSA-2015-1483.html http://www.securityfocus.com/bid/76021 http://www.securitytracker.com/id/1033040 https://access.redhat.com/articles/1537873 https://www.qu • CWE-20: Improper Input Validation CWE-138: Improper Neutralization of Special Elements •