CVE-2006-1174
Summary
| CVE | CVE-2006-1174 |
|---|---|
| State | PUBLISHED |
| Assigner | certcc |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2006-05-28 23:02:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox. |
Risk And Classification
Primary CVSS: v2.0 3.7 from [email protected]
AV:L/AC:H/Au:N/C:P/I:P/A:P
EPSS: 0.000960000 probability, percentile 0.265610000 (date 2026-04-20)
Problem Types: CWE-264 | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
HighAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:L/AC:H/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Debian | Shadow | 4.0.0 | All | All | All |
| Application | Debian | Shadow | 4.0.1 | All | All | All |
| Application | Debian | Shadow | 4.0.2 | All | All | All |
| Application | Debian | Shadow | 4.0.4 | All | All | All |
| Application | Debian | Shadow | 4.0.4.1 | All | All | All |
| Application | Debian | Shadow | 4.0.5 | All | All | All |
| Application | Debian | Shadow | 4.0.6 | All | All | All |
| Application | Debian | Shadow | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| patches.sgi.com/support/free/security/advisories/20070602-01-P.asc | af854a3a-2127-422b-91ae-364da2661108 | patches.sgi.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| Gentoo update for shadow - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Red Hat update for shadow-utils - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| VMware ESX Server Multiple Security Updates - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [Full-Disclosure] Mailing List Charter | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| SecurityFocus | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Shadow-Utils 'useradd' Local Insecure Permissions Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch |
| US-CERT Vulnerability Note VU#312692 | af854a3a-2127-422b-91ae-364da2661108 | www.kb.cert.org | US Government Resource |
| issues.rpath.com/browse/RPL-1357 | af854a3a-2127-422b-91ae-364da2661108 | issues.rpath.com | |
| SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| ASA-2007-249 (RHSA-2007-0276) | af854a3a-2127-422b-91ae-364da2661108 | support.avaya.com | |
| Gentoo update for vmware - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Webmail - OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Avaya Products Shadow "useradd.c" Insecure Mailbox File Permissions - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Shadow "useradd.c" Insecure Mailbox File Permissions - Secunia Advisories - Vulnerability Intelligence - Secunia.com | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Patch, Vendor Advisory |
| Gentoo Linux Documentation -- shadow: Privilege escalation | af854a3a-2127-422b-91ae-364da2661108 | www.gentoo.org | |
| Error 404 (Not Found)!!1 | af854a3a-2127-422b-91ae-364da2661108 | cvs.pld.org.pl | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Red Hat Update for Multiple Packages - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | Vendor Advisory |
| Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Advisories - Mandriva Linux | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| SecurityTracker.com Archives - shadow-utils 'useradd' Unsafe Mailbox Folder Permissions May Let Local Users Read/Write Mail | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| rPath update for shadow - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-09-06 | Mark J Cox | Red Hat is aware of this issue and is tracking it via the following bugs: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=193053 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229194 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode. |
There are currently no legacy QID mappings associated with this CVE.