Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2002-1509
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A patch for shadow-utils 20000902 causes the useradd command to create a mail spool files with read/write privileges of the new user's group (mode 660), which allows other users in the same group to read or modify the new user's incoming email.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
RedHat useradd邮箱存储文件权限设置漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
shadow-utils工具包含了一些转换UNIX密码文件为shadow密码格式的文件,还有管理用户和组帐户的程序,其中之一就是useradd程序用于建立或更新新用户信息。 RedHat包含的useradd建立邮箱文件时设置权限不正确,本地攻击者可以利用这个漏洞读和写其他用户邮件文件。 当建议用户帐户时,RedHat Linux 7.2、7.3和8.0包含的useradd不正确设置邮箱文件组权限,本来应该设置此文件的组属组为'mail'组,而useradd设置为用户相关的组,因此如果攻击与其他用户同属一组
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2002-1509
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2002-1509
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2002-1509

No comments yet


Leave a comment