---------------------------------------------------------------------- Hardcore Disassembler / Reverse Engineer Wanted! Want to work with IDA and BinDiff? Want to write PoC's and Exploits? Your nationality is not important. We will get you a work permit, find an apartment, and offer a relocation compensation package. http://secunia.com/hardcore_disassembler_and_reverse_engineer/ ---------------------------------------------------------------------- TITLE: Ubuntu Installer Empty Root Password Security Issue SECUNIA ADVISORY ID: SA21022 VERIFY ADVISORY: http://secunia.com/advisories/21022/ CRITICAL: Less critical IMPACT: Privilege escalation WHERE: Local system OPERATING SYSTEM: Ubuntu Linux 6.06 http://secunia.com/product/10611/ DESCRIPTION: A security issue has been reported in Ubuntu, which potentially can be exploited by malicious, local users to gain escalated privileges. The problem is that the installer may set the root password blank and not locked when installing from the Alternate install CD or the Server install CD in a certain way. SOLUTION: Apply updated packages. -- Ubuntu 6.06 LTS -- Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.2.diff.gz Size/MD5: 204800 1b29e1615364944d98ea95498d6058b8 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13-7ubuntu3.2.dsc Size/MD5: 885 8ccf50d026fa2c4cffe85330f0d0985a http://security.ubuntu.com/ubuntu/pool/main/s/shadow/shadow_4.0.13.orig.tar.gz Size/MD5: 1622557 034fab52e187e63cb52f153bb7f304c8 http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4.dsc Size/MD5: 678 544762def71fb062b6d6f5484a4d7c45 http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4.tar.gz Size/MD5: 98334 f8d648ce6a9a007740b0e175b92385eb Architecture independent packages: http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup-udeb_1.1ubuntu4_all.udeb Size/MD5: 79418 4ec2af1d5e09f129d486c142575f4081 http://security.ubuntu.com/ubuntu/pool/main/u/user-setup/user-setup_1.1ubuntu4_all.deb Size/MD5: 161864 bc876d6099a323cebd2ffc94df41db06 amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_amd64.deb Size/MD5: 249450 bfdba1450cbe14f6c71f5d9dee5df9b3 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_amd64.deb Size/MD5: 683510 547ad48ac45f6f11cacbd268f42b152a i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_i386.deb Size/MD5: 240938 8500a4c2ab53f11b3fb8cb7fb4e00c78 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_i386.deb Size/MD5: 616346 a29d90e0ae7c7c70cbeffcbfba6bf04e powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_powerpc.deb Size/MD5: 251380 bd408187e20f19222e2b4fefe8706552 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_powerpc.deb Size/MD5: 665158 4975fe8598b4a8adc98fabcee1b4cb8e sparc architecture (Sun SPARC/UltraSPARC) http://security.ubuntu.com/ubuntu/pool/main/s/shadow/login_4.0.13-7ubuntu3.2_sparc.deb Size/MD5: 239930 85dde4bfa6d09491338f70efe9d6d336 http://security.ubuntu.com/ubuntu/pool/main/s/shadow/passwd_4.0.13-7ubuntu3.2_sparc.deb Size/MD5: 620124 b0fcdadde2568b1a8324e2500718a18b PROVIDED AND/OR DISCOVERED BY: The vendor credits Iwan Pieterse. ORIGINAL ADVISORY: http://www.ubuntu.com/usn/usn-316-1 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------