Lucene search

K
cve[email protected]CVE-2006-1283
HistoryMar 23, 2006 - 8:06 p.m.

CVE-2006-1283

2006-03-2320:06:00
web.nvd.nist.gov
24
opiepasswd
opie
freebsd
root privileges
cve-2006-1283
security vulnerability
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.6%

opiepasswd in One-Time Passwords in Everything (OPIE) in FreeBSD 4.10-RELEASE-p22 through 6.1-STABLE before 20060322 uses the getlogin function to determine the invoking user account, which might allow local users to configure OPIE access to the root account and possibly gain root privileges if a root shell is permitted by the configuration of the wheel group or sshd.

Affected configurations

NVD
Node
freebsdfreebsdMatch1.1.5.1
OR
freebsdfreebsdMatch2.0
OR
freebsdfreebsdMatch2.0.5
OR
freebsdfreebsdMatch2.1stable
OR
freebsdfreebsdMatch2.1.0
OR
freebsdfreebsdMatch2.1.5
OR
freebsdfreebsdMatch2.1.6
OR
freebsdfreebsdMatch2.1.6.1
OR
freebsdfreebsdMatch2.1.7
OR
freebsdfreebsdMatch2.1.7.1
OR
freebsdfreebsdMatch2.2
OR
freebsdfreebsdMatch2.2.1
OR
freebsdfreebsdMatch2.2.2
OR
freebsdfreebsdMatch2.2.3
OR
freebsdfreebsdMatch2.2.4
OR
freebsdfreebsdMatch2.2.5
OR
freebsdfreebsdMatch2.2.6
OR
freebsdfreebsdMatch2.2.7
OR
freebsdfreebsdMatch2.2.8
OR
freebsdfreebsdMatch3.0
OR
freebsdfreebsdMatch3.0releng
OR
freebsdfreebsdMatch3.1
OR
freebsdfreebsdMatch3.2
OR
freebsdfreebsdMatch3.3
OR
freebsdfreebsdMatch3.4
OR
freebsdfreebsdMatch3.5
OR
freebsdfreebsdMatch3.5stable
OR
freebsdfreebsdMatch3.5.1
OR
freebsdfreebsdMatch3.5.1release
OR
freebsdfreebsdMatch3.5.1stable
OR
freebsdfreebsdMatch4.0
OR
freebsdfreebsdMatch4.0alpha
OR
freebsdfreebsdMatch4.0releng
OR
freebsdfreebsdMatch4.1
OR
freebsdfreebsdMatch4.1.1
OR
freebsdfreebsdMatch4.1.1release
OR
freebsdfreebsdMatch4.1.1stable
OR
freebsdfreebsdMatch4.2
OR
freebsdfreebsdMatch4.2stable
OR
freebsdfreebsdMatch4.3
OR
freebsdfreebsdMatch4.3release
OR
freebsdfreebsdMatch4.3release_p38
OR
freebsdfreebsdMatch4.3releng
OR
freebsdfreebsdMatch4.3stable
OR
freebsdfreebsdMatch4.4
OR
freebsdfreebsdMatch4.4release_p42
OR
freebsdfreebsdMatch4.4releng
OR
freebsdfreebsdMatch4.4stable
OR
freebsdfreebsdMatch4.5
OR
freebsdfreebsdMatch4.5release
OR
freebsdfreebsdMatch4.5release_p32
OR
freebsdfreebsdMatch4.5releng
OR
freebsdfreebsdMatch4.5stable
OR
freebsdfreebsdMatch4.6
OR
freebsdfreebsdMatch4.6release
OR
freebsdfreebsdMatch4.6release_p20
OR
freebsdfreebsdMatch4.6releng
OR
freebsdfreebsdMatch4.6stable
OR
freebsdfreebsdMatch4.6.2
OR
freebsdfreebsdMatch4.7
OR
freebsdfreebsdMatch4.7release
OR
freebsdfreebsdMatch4.7release_p17
OR
freebsdfreebsdMatch4.7releng
OR
freebsdfreebsdMatch4.7stable
OR
freebsdfreebsdMatch4.8
OR
freebsdfreebsdMatch4.8pre-release
OR
freebsdfreebsdMatch4.8release_p7
OR
freebsdfreebsdMatch4.8releng
OR
freebsdfreebsdMatch4.9
OR
freebsdfreebsdMatch4.9pre-release
OR
freebsdfreebsdMatch4.9releng
OR
freebsdfreebsdMatch4.10
OR
freebsdfreebsdMatch4.10release
OR
freebsdfreebsdMatch4.10release_p8
OR
freebsdfreebsdMatch4.10releng
OR
freebsdfreebsdMatch4.11release_p3
OR
freebsdfreebsdMatch4.11releng
OR
freebsdfreebsdMatch4.11stable
OR
freebsdfreebsdMatch5.0
OR
freebsdfreebsdMatch5.0alpha
OR
freebsdfreebsdMatch5.0release_p14
OR
freebsdfreebsdMatch5.0releng
OR
freebsdfreebsdMatch5.1
OR
freebsdfreebsdMatch5.1alpha
OR
freebsdfreebsdMatch5.1release
OR
freebsdfreebsdMatch5.1release_p5
OR
freebsdfreebsdMatch5.1releng
OR
freebsdfreebsdMatch5.2
OR
freebsdfreebsdMatch5.2.1release
OR
freebsdfreebsdMatch5.2.1releng
OR
freebsdfreebsdMatch5.3
OR
freebsdfreebsdMatch5.3release
OR
freebsdfreebsdMatch5.3releng
OR
freebsdfreebsdMatch5.3stable
OR
freebsdfreebsdMatch5.4pre-release
OR
freebsdfreebsdMatch5.4release
OR
freebsdfreebsdMatch5.4releng
OR
freebsdfreebsdMatch5.4stable
OR
freebsdfreebsdMatch6.0release
OR
freebsdfreebsdMatch6.0stable

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.6%