TITLE: Ubuntu Installer Log Files Exposure of User Credentials SECUNIA ADVISORY ID: SA19200 VERIFY ADVISORY: http://secunia.com/advisories/19200/ CRITICAL: Less critical IMPACT: Exposure of sensitive information WHERE: Local system OPERATING SYSTEM: Ubuntu Linux 5.10 http://secunia.com/product/6606/ DESCRIPTION: Karl Řie has reported a security issue in Ubuntu, which can be exploited by malicious, local users to disclose sensitive information. The problem is caused due to user credentials being written to world-readable installation log files during installation. This can be exploited to disclose the password of the first user account. SOLUTION: Apply updated packages. -- Ubuntu 5.10 (Breezy Badger) -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/b/base-config/base-config_2.67ubuntu20.dsc Size/MD5: 758 c22bb6e3be4d59aa93e84327f60e89ab http://security.ubuntu.com/ubuntu/pool/main/b/base-config/base-config_2.67ubuntu20.tar.gz Size/MD5: 577194 99eabbe70227169feaff28ff9062d097 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu8.diff.gz Size/MD5: 1067297 9db7bb924125a5587380efc08f6787e1 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3-37ubuntu8.dsc Size/MD5: 876 50cdfae3bfbe1bb1bb4be192d7de19a7 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.3.orig.tar.gz Size/MD5: 1045704 b52dfb2e5e8d9a4a2aae0ca1b266c513 Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/b/base-config/apt-setup-udeb_2.67ubuntu20_all.udeb Size/MD5: 3298 dd42b2901f6f5d7525083c27cbb23407 http://security.ubuntu.com/ubuntu/pool/main/b/base-config/base-config_2.67ubuntu20_all.deb Size/MD5: 291224 e95d7a1d25074ea57d444e817cef1850 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/initial-passwd-udeb_4.0.3-37ubuntu8_all.udeb Size/MD5: 1740 6c7bc8e12968d9876b6e1b27f0476484 http://security.ubuntu.com/ubuntu/pool/main/b/base-config/tzsetup-udeb_2.67ubuntu20_all.udeb Size/MD5: 2760 f6ebc84fd2bff0275b1e64d53fdc9955 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu8_amd64.deb Size/MD5: 180662 de75ded6034f0d7226dfbf0ec66e2be7 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu8_amd64.deb Size/MD5: 589790 f90c48af4e1c55202f22127e72dbf45d i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu8_i386.deb Size/MD5: 171882 347fa929d15c3689bd68fc487cc116c6 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu8_i386.deb Size/MD5: 515580 b8c965e4a5c40d1c50e8816aeef689bc powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.3-37ubuntu8_powerpc.deb Size/MD5: 179886 42ebfcd496b621bdab29e9a6b3f50522 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.3-37ubuntu8_powerpc.deb Size/MD5: 568426 089edb3f8110ab191bba6d061b199385 PROVIDED AND/OR DISCOVERED BY: Karl Řie ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-262-1 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------