3814 : Multiple Unix Vendor passwd Malformed ulimit /etc/passwd Manipulation
Printer | http://osvdb.org/3814 | Email This | Edit Vulnerability

Views This Week Views All Time Added to OSVDB Last Modified Modified (since 2008) Percent Complete
2 1999 about 10 years ago over 4 years ago 1 times 90%


Disclosure Date


passwd contains an implementation flaw that may allow a local denial of service. The issue is triggered when the 'passwd' command is used in an environment with a very small ulimit value. If /etc/passwd is larger than the ulimit, use of the 'passwd' command will result in a truncated /etc/passwd file. If ulimit was set to 0 the /etc/passwd file will be empty, which will invalidate all password authentication attempts, and result in a loss of availability.


Location: Local Access Required
Attack Type: Authentication Management
Impact: Loss of Availability
Exploit: Exploit Public


Modern implementations of the 'passwd' utility perform adequate checks to avoid this vulnerabilitu. Refer to the vendor documentation for specific version numbers. An upgrade is required as there are no known workarounds.


System V



Unknown or Incomplete

CVSSv2 Score

NVD does not currently have a CVSSv2 score assigned.


No Comments.

The database information may change without any notice. Use of the information constitutes acceptance for use in an AS IS condition, and there are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the copyright holder or distributor (OSVDB or OSF) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

© Copyright 2002 - 2014 Open Sourced Vulnerability Database (OSVDB), All Rights Reserved.
License - Privacy Statement - Terms of Use