CVE-2006-3378
https://notcve.org/view.php?id=CVE-2006-3378
passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits. Comando passwd en shadow, en Ubuntu 5.04 through 6.06 LTS, cuando se pasa como parámetro –f, -g o –s, no comprueba el código de retorno de una llamada seguid, lo que podría provocar que usuarios locales obtuvieran privilegios de administrador (root) si seguid falla en casos como errores PAM o límite de recursos. • http://secunia.com/advisories/20950 http://secunia.com/advisories/20966 http://secunia.com/advisories/21480 http://www.debian.org/security/2006/dsa-1150 http://www.osvdb.org/26995 http://www.securityfocus.com/bid/18850 http://www.ubuntu.com/usn/usn-308-1 •
CVE-2006-1183 – Ubuntu 5.10 Installer - Password Disclosure
https://notcve.org/view.php?id=CVE-2006-1183
The Ubuntu 5.10 installer does not properly clear passwords from the installer log file (questions.dat), and leaves the log file with world-readable permissions, which allows local users to gain privileges. • https://www.exploit-db.com/exploits/1579 http://secunia.com/advisories/19200 http://securitytracker.com/id?1015761 http://www.osvdb.org/23868 http://www.securityfocus.com/bid/17086 http://www.vupen.com/english/advisories/2006/0927 https://exchange.xforce.ibmcloud.com/vulnerabilities/25170 https://launchpad.net/distros/ubuntu/+source/shadow/+bug/34606 https://usn.ubuntu.com/262-1 •
CVE-2006-0151
https://notcve.org/view.php?id=CVE-2006-0151
sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158. • http://secunia.com/advisories/18358 http://secunia.com/advisories/18363 http://secunia.com/advisories/18549 http://secunia.com/advisories/18558 http://secunia.com/advisories/18906 http://secunia.com/advisories/19016 http://secunia.com/advisories/21692 http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.421822 http://www.debian.org/security/2006/dsa-946 http://www.mandriva.com/security/advisories?name=MDKSA-2006:159 http://www.novell.com/l •
CVE-2005-3626
https://notcve.org/view.php?id=CVE-2005-3626
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (crash) via a crafted FlateDecode stream that triggers a null dereference. • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html http://rhn.redhat.com/errata/RHSA-2006-0177.html http://scary.beasts.org/security/CESA-2005-003.txt http://secunia.com/ • CWE-399: Resource Management Errors •
CVE-2005-3625
https://notcve.org/view.php?id=CVE-2005-3625
Xpdf, as used in products such as gpdf, kpdf, pdftohtml, poppler, teTeX, CUPS, libextractor, and others, allows attackers to cause a denial of service (infinite loop) via streams that end prematurely, as demonstrated using the (1) CCITTFaxDecode and (2) DCTDecode streams, aka "Infinite CPU spins." • ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.15/SCOSA-2006.15.txt ftp://patches.sgi.com/support/free/security/advisories/20051201-01-U ftp://patches.sgi.com/support/free/security/advisories/20060101-01-U ftp://patches.sgi.com/support/free/security/advisories/20060201-01-U http://lists.suse.com/archive/suse-security-announce/2006-Jan/0001.html http://rhn.redhat.com/errata/RHSA-2006-0177.html http://scary.beasts.org/security/CESA-2005-003.txt http://secunia.com/ • CWE-399: Resource Management Errors •