Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2006-6681
Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Pedro Lineu Orso chetcpasswd 2.3.3 does not have a rate limit for client requests, which might allow remote attackers to determine passwords via a dictionary attack.
0
Attacker Value
Unknown
CVE-2006-6679
Disclosure Date: December 21, 2006 (last updated January 25, 2024)
Pedro Lineu Orso chetcpasswd before 2.4 relies on the X-Forwarded-For HTTP header when verifying a client's status on an IP address ACL, which allows remote attackers to gain unauthorized access by spoofing this header.
0
Attacker Value
Unknown
CVE-2006-6683
Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM.
0
Attacker Value
Unknown
CVE-2006-6684
Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd before 2.4 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long X-Forwarded-For HTTP header. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown
CVE-2006-6680
Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Pedro Lineu Orso chetcpasswd before 2.3.1 does not document the need for 0400 permissions on /etc/chetcpasswd.allow, which might allow local users to gain sensitive information by reading this file.
0
Attacker Value
Unknown
CVE-2006-6682
Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Pedro Lineu Orso chetcpasswd 2.3.3 provides a different error message when a request with a valid username fails, compared to a request with an invalid username, which allows remote attackers to determine valid usernames on the system.
0
Attacker Value
Unknown
CVE-2006-6685
Disclosure Date: December 21, 2006 (last updated October 04, 2023)
Heap-based buffer overflow in Pedro Lineu Orso chetcpasswd 2.3.3 allows local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long REMOTE_ADDR environment variable. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
0
Attacker Value
Unknown
CVE-2006-6639
Disclosure Date: December 19, 2006 (last updated October 04, 2023)
Multiple unspecified vulnerabilities in chetcpasswd 2.4.1 allow local users to gain privileges via unspecified vectors related to executing (1) the cp program, (2) the mail program, or (3) the program specified in the post_change configuration line.
0
Attacker Value
Unknown
CVE-2002-2220
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Buffer overflow in Pedro Lineu Orso chetcpasswd before 1.12, when configured for access from 0.0.0.0, allows local users to gain privileges via unspecified vectors.
0
Attacker Value
Unknown
CVE-2002-2221
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Untrusted search path vulnerability in Pedro Lineu Orso chetcpasswd 2.4.1 and earlier allows local users to gain privileges via a modified PATH that references a malicious cp binary. NOTE: this issue might overlap CVE-2006-6639.
0