CVE-2008-1946 – /etc/pam.d/su is wrong in RHEL-4.6
https://notcve.org/view.php?id=CVE-2008-1946
The default configuration of su in /etc/pam.d/su in GNU coreutils 5.2.1 allows local users to gain the privileges of a (1) locked or (2) expired account by entering the account name on the command line, related to improper use of the pam_succeed_if.so module. La configuración por defecto de "su" en /etc/pam.d/su en GNU Coreutils 5.2.1, permite a usuarios locales elevar sus privilegios de una cuenta (1) bloqueada o (2) caducada introduciendo el nombre de usuario en la línea de comandos. Relacionado con un uso indebido del módulo pam_succeed_if.so. • http://rhn.redhat.com/errata/RHSA-2008-0780.html http://secunia.com/advisories/31225 http://securitytracker.com/id?1020552 http://www.securityfocus.com/bid/30363 https://exchange.xforce.ibmcloud.com/vulnerabilities/43993 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10029 https://access.redhat.com/security/cve/CVE-2008-1946 https://bugzilla.redhat.com/show_bug.cgi?id=446488 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-1039
https://notcve.org/view.php?id=CVE-2005-1039
Race condition in Core Utilities (coreutils) 5.2.1, when (1) mkdir, (2) mknod, or (3) mkfifo is running with the -m switch, allows local users to modify permissions of other files. • http://www.securityfocus.com/bid/13053 •