{"api_version":"1","generated_at":"2026-04-25T05:16:38+00:00","cve":"CVE-2006-1174","urls":{"html":"https://cve.report/CVE-2006-1174","api":"https://cve.report/api/cve/CVE-2006-1174.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-1174","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-1174"},"summary":{"title":"CVE-2006-1174","description":"useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox.","state":"PUBLISHED","assigner":"certcc","published_at":"2006-05-28 23:02:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-264","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"3.7","severity":"","vector":"AV:L/AC:H/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","name":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26958","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26958","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20506","name":"http://secunia.com/advisories/20506","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Gentoo update for shadow - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25629","name":"http://secunia.com/advisories/25629","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Red Hat update for shadow-utils - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0276.html","name":"http://www.redhat.com/support/errata/RHSA-2007-0276.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/26909","name":"http://secunia.com/advisories/26909","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"VMware ESX Server Multiple Security Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html","name":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[Full-Disclosure] Mailing List Charter","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://www.securityfocus.com/archive/1/468336/100/0/threaded","name":"http://www.securityfocus.com/archive/1/468336/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/18111","name":"http://www.securityfocus.com/bid/18111","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Shadow-Utils 'useradd' Local Insecure Permissions Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.kb.cert.org/vuls/id/312692","name":"http://www.kb.cert.org/vuls/id/312692","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"US-CERT Vulnerability Note VU#312692","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://issues.rpath.com/browse/RPL-1357","name":"https://issues.rpath.com/browse/RPL-1357","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/25894","name":"http://secunia.com/advisories/25894","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"SGI Advanced Linux Environment Multiple Updates - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm","name":"http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"ASA-2007-249 (RHSA-2007-0276)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27706","name":"http://secunia.com/advisories/27706","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Gentoo update for vmware - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2006/2006","name":"http://www.vupen.com/english/advisories/2006/2006","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail - OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25896","name":"http://secunia.com/advisories/25896","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Avaya Products Shadow \"useradd.c\" Insecure Mailbox File Permissions - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/20370","name":"http://secunia.com/advisories/20370","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Shadow \"useradd.c\" Insecure Mailbox File Permissions - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.gentoo.org/security/en/glsa/glsa-200606-02.xml","name":"http://www.gentoo.org/security/en/glsa/glsa-200606-02.xml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Gentoo Linux Documentation\n--\n  shadow: Privilege escalation","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://cvs.pld.org.pl/shadow/NEWS?rev=1.109","name":"http://cvs.pld.org.pl/shadow/NEWS?rev=1.109","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Error 404 (Not Found)!!1","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10807","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10807","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25098","name":"http://secunia.com/advisories/25098","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Red Hat Update for Multiple Packages - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2007/3229","name":"http://www.vupen.com/english/advisories/2007/3229","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2007-0431.html","name":"http://www.redhat.com/support/errata/RHSA-2007-0431.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:090","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:090","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1018221","name":"http://www.securitytracker.com/id?1018221","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - shadow-utils 'useradd' Unsafe Mailbox Folder Permissions May Let Local Users Read/Write Mail","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/25267","name":"http://secunia.com/advisories/25267","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"rPath update for shadow - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-1174","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-1174","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.4.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"4.0.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2006","cve_id":"1174","vulnerable":"1","versionEndIncluding":"4.0.7","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"debian","cpe5":"shadow","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[{"cvename":"CVE-2006-1174","organization":"Red Hat","lastmodified":"2007-09-06","contributor":"Mark J Cox","statementText":"Red Hat is aware of this issue and is tracking it via the following bugs: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=193053 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=229194 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. More information regarding issue severity can be found here: http://www.redhat.com/security/updates/classification/ The risks associated with fixing this bug are greater than the low severity security risk. We therefore currently have no plans to fix this flaw in Red Hat Enterprise Linux 2.1 which is in maintenance mode.","cve_year":"2006","cve_id":"1174","crc32":"9d9c84ad"}],"enrichments":{"kev":null,"epss":{"cve_year":"2006","cve_id":"1174","cve":"CVE-2006-1174","epss":"0.000960000","percentile":"0.265610000","score_date":"2026-04-20","updated_at":"2026-04-21 00:07:48"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T17:03:28.515Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player","tags":["mailing-list","x_refsource_FULLDISC","x_transferred"],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"name":"25098","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25098"},{"name":"25894","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25894"},{"name":"RHSA-2007:0431","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0431.html"},{"name":"ADV-2007-3229","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2007/3229"},{"name":"25267","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25267"},{"name":"RHSA-2007:0276","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0276.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm"},{"name":"18111","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/18111"},{"name":"1018221","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1018221"},{"name":"25629","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25629"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://cvs.pld.org.pl/shadow/NEWS?rev=1.109"},{"name":"shadow-utils-useradd-file-permission(26958)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26958"},{"name":"VU#312692","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/312692"},{"name":"GLSA-200606-02","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200606-02.xml"},{"name":"25896","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25896"},{"name":"20070511 rPSA-2007-0096-1 shadow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/468336/100/0/threaded"},{"name":"MDKSA-2006:090","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:090"},{"name":"oval:org.mitre.oval:def:10807","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10807"},{"name":"26909","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/26909"},{"name":"27706","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27706"},{"name":"ADV-2006-2006","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2006/2006"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://issues.rpath.com/browse/RPL-1357"},{"name":"20506","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20506"},{"name":"20370","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/20370"},{"name":"20070602-01-P","tags":["vendor-advisory","x_refsource_SGI","x_transferred"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-05-24T00:00:00.000Z","descriptions":[{"lang":"en","value":"useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-18T14:57:01.000Z","orgId":"37e5125f-f79b-445b-8fad-9564f167944b","shortName":"certcc"},"references":[{"name":"20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player","tags":["mailing-list","x_refsource_FULLDISC"],"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"name":"25098","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25098"},{"name":"25894","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25894"},{"name":"RHSA-2007:0431","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0431.html"},{"name":"ADV-2007-3229","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2007/3229"},{"name":"25267","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25267"},{"name":"RHSA-2007:0276","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2007-0276.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm"},{"name":"18111","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/18111"},{"name":"1018221","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1018221"},{"name":"25629","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25629"},{"tags":["x_refsource_CONFIRM"],"url":"http://cvs.pld.org.pl/shadow/NEWS?rev=1.109"},{"name":"shadow-utils-useradd-file-permission(26958)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26958"},{"name":"VU#312692","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/312692"},{"name":"GLSA-200606-02","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"http://www.gentoo.org/security/en/glsa/glsa-200606-02.xml"},{"name":"25896","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25896"},{"name":"20070511 rPSA-2007-0096-1 shadow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/468336/100/0/threaded"},{"name":"MDKSA-2006:090","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:090"},{"name":"oval:org.mitre.oval:def:10807","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10807"},{"name":"26909","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/26909"},{"name":"27706","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27706"},{"name":"ADV-2006-2006","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2006/2006"},{"tags":["x_refsource_CONFIRM"],"url":"https://issues.rpath.com/browse/RPL-1357"},{"name":"20506","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20506"},{"name":"20370","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/20370"},{"name":"20070602-01-P","tags":["vendor-advisory","x_refsource_SGI"],"url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cert@cert.org","ID":"CVE-2006-1174","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"20070920 VMSA-2007-0006 Critical security updates for all supported versions of VMware ESX Server, VMware Server, VMware Workstation, VMware ACE, and VMware Player","refsource":"FULLDISC","url":"http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"},{"name":"25098","refsource":"SECUNIA","url":"http://secunia.com/advisories/25098"},{"name":"25894","refsource":"SECUNIA","url":"http://secunia.com/advisories/25894"},{"name":"RHSA-2007:0431","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0431.html"},{"name":"ADV-2007-3229","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2007/3229"},{"name":"25267","refsource":"SECUNIA","url":"http://secunia.com/advisories/25267"},{"name":"RHSA-2007:0276","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2007-0276.html"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2007-249.htm"},{"name":"18111","refsource":"BID","url":"http://www.securityfocus.com/bid/18111"},{"name":"1018221","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1018221"},{"name":"25629","refsource":"SECUNIA","url":"http://secunia.com/advisories/25629"},{"name":"http://cvs.pld.org.pl/shadow/NEWS?rev=1.109","refsource":"CONFIRM","url":"http://cvs.pld.org.pl/shadow/NEWS?rev=1.109"},{"name":"shadow-utils-useradd-file-permission(26958)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/26958"},{"name":"VU#312692","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/312692"},{"name":"GLSA-200606-02","refsource":"GENTOO","url":"http://www.gentoo.org/security/en/glsa/glsa-200606-02.xml"},{"name":"25896","refsource":"SECUNIA","url":"http://secunia.com/advisories/25896"},{"name":"20070511 rPSA-2007-0096-1 shadow","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/468336/100/0/threaded"},{"name":"MDKSA-2006:090","refsource":"MANDRIVA","url":"http://www.mandriva.com/security/advisories?name=MDKSA-2006:090"},{"name":"oval:org.mitre.oval:def:10807","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10807"},{"name":"26909","refsource":"SECUNIA","url":"http://secunia.com/advisories/26909"},{"name":"27706","refsource":"SECUNIA","url":"http://secunia.com/advisories/27706"},{"name":"ADV-2006-2006","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2006/2006"},{"name":"https://issues.rpath.com/browse/RPL-1357","refsource":"CONFIRM","url":"https://issues.rpath.com/browse/RPL-1357"},{"name":"20506","refsource":"SECUNIA","url":"http://secunia.com/advisories/20506"},{"name":"20370","refsource":"SECUNIA","url":"http://secunia.com/advisories/20370"},{"name":"20070602-01-P","refsource":"SGI","url":"ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc"}]}}}},"cveMetadata":{"assignerOrgId":"37e5125f-f79b-445b-8fad-9564f167944b","assignerShortName":"certcc","cveId":"CVE-2006-1174","datePublished":"2006-05-28T23:00:00.000Z","dateReserved":"2006-03-12T00:00:00.000Z","dateUpdated":"2024-08-07T17:03:28.515Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2006-05-28 23:02:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-264","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.7","matchCriteriaId":"AED127ED-19EC-4726-BEE0-54F0D79EB687"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.0:*:*:*:*:*:*:*","matchCriteriaId":"2973B149-FE07-4419-93A3-60AA9869A0DA"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BA08859D-4D5B-4B0A-9806-2B32A10B8B57"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"967E773A-162A-412B-832A-FB8CEFCCD9BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.4:*:*:*:*:*:*:*","matchCriteriaId":"B5B4F1B0-3ECC-4087-88CE-FD5D479891AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.4.1:*:*:*:*:*:*:*","matchCriteriaId":"D1E94046-69F7-485B-ADF8-F10619B23E6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.5:*:*:*:*:*:*:*","matchCriteriaId":"B5B4260C-E44F-4D48-9349-BA089F1F1AF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:debian:shadow:4.0.6:*:*:*:*:*:*:*","matchCriteriaId":"A003CA1C-0427-4257-A579-1BFA91A51CCC"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2006","CveId":"1174","Ordinal":"1","Title":"CVE-2006-1174","CVE":"CVE-2006-1174","Year":"2006"},"notes":[{"CveYear":"2006","CveId":"1174","Ordinal":"1","NoteData":"useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox.","Type":"Description","Title":"CVE-2006-1174"},{"CveYear":"2006","CveId":"1174","Ordinal":"2","NoteData":"2006-05-28","Type":"Other","Title":"Published"},{"CveYear":"2006","CveId":"1174","Ordinal":"3","NoteData":"2018-10-18","Type":"Other","Title":"Modified"}]}}}