CVE-2011-0002 (GCVE-0-2011-0002)
Vulnerability from cvelistv5
Published
2011-01-22 21:00
Modified
2024-08-06 21:36
Severity ?
CWE
  • n/a
Summary
libuser before 0.57 uses a cleartext password value of (1) !! or (2) x for new LDAP user accounts, which makes it easier for remote attackers to obtain access by specifying one of these values.
References
secalert@redhat.comhttp://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html
secalert@redhat.comhttp://secunia.com/advisories/42891Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/42966Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/43047
secalert@redhat.comhttp://securitytracker.com/id?1024960
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:019
secalert@redhat.comhttp://www.osvdb.org/70421
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-0170.html
secalert@redhat.comhttp://www.securityfocus.com/bid/45791
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0184Vendor Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0201
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0226
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=643227Exploit
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/64677
secalert@redhat.comhttps://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57
af854a3a-2127-422b-91ae-364da2661108http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42891Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42966Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43047
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1024960
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:019
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/70421
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-0170.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/45791
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0184Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0201
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0226
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=643227Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/64677
af854a3a-2127-422b-91ae-364da2661108https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:36:02.383Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2011:0170",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0170.html"
          },
          {
            "name": "43047",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43047"
          },
          {
            "name": "1024960",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1024960"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643227"
          },
          {
            "name": "FEDORA-2011-0316",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html"
          },
          {
            "name": "42891",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42891"
          },
          {
            "name": "45791",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45791"
          },
          {
            "name": "ADV-2011-0226",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0226"
          },
          {
            "name": "libuser-password-security-bypass(64677)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64677"
          },
          {
            "name": "ADV-2011-0201",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0201"
          },
          {
            "name": "42966",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/42966"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57"
          },
          {
            "name": "ADV-2011-0184",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0184"
          },
          {
            "name": "70421",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/70421"
          },
          {
            "name": "MDVSA-2011:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:019"
          },
          {
            "name": "FEDORA-2011-0320",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-01-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libuser before 0.57 uses a cleartext password value of (1) !! or (2) x for new LDAP user accounts, which makes it easier for remote attackers to obtain access by specifying one of these values."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2011:0170",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0170.html"
        },
        {
          "name": "43047",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43047"
        },
        {
          "name": "1024960",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1024960"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643227"
        },
        {
          "name": "FEDORA-2011-0316",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html"
        },
        {
          "name": "42891",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42891"
        },
        {
          "name": "45791",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45791"
        },
        {
          "name": "ADV-2011-0226",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0226"
        },
        {
          "name": "libuser-password-security-bypass(64677)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64677"
        },
        {
          "name": "ADV-2011-0201",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0201"
        },
        {
          "name": "42966",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/42966"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57"
        },
        {
          "name": "ADV-2011-0184",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0184"
        },
        {
          "name": "70421",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/70421"
        },
        {
          "name": "MDVSA-2011:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:019"
        },
        {
          "name": "FEDORA-2011-0320",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-0002",
    "datePublished": "2011-01-22T21:00:00",
    "dateReserved": "2010-12-07T00:00:00",
    "dateUpdated": "2024-08-06T21:36:02.383Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2011-0002\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2011-01-22T22:00:06.677\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libuser before 0.57 uses a cleartext password value of (1) !! or (2) x for new LDAP user accounts, which makes it easier for remote attackers to obtain access by specifying one of these values.\"},{\"lang\":\"es\",\"value\":\"libuser en versiones anteriores a la 0.57 usa la contrase\u00f1a en texto claro  (1) !! o (2) x  para cuentas de usuario LDAP nuevas, lo que facilita a atacantes remotos obtener acceso especificando uno de estos valores.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:N\",\"baseScore\":6.4,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-310\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"0.56.18\",\"matchCriteriaId\":\"FCD62752-EEFB-4B70-B3EB-DDC562F0CD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"030E21A6-D41D-4A1D-B252-B40639E9D0EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088F5D5F-8C2C-463A-9700-9184FECD7E8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D337C444-77A6-4F5A-BBD4-3078FBC059F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD3B113-962A-4E79-9F14-91EFAE91EF66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"530C3814-FE11-4F28-A673-56BA705AF6D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1876F593-0807-4FE7-95C8-F97AD8E348BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74122FF9-1F0F-42BA-A5D5-B8A624163874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CA34546-5B16-4F12-91E8-3ADE134A1B8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4854A20-5042-4749-8CF2-A561DB3B107B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297CAC73-E10E-43A6-851E-F053ABDF4E9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D66D10-5CFF-485E-9CE4-16825C8DEAF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C8FF317-A6B0-42C8-AF90-24543D4806CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4917504D-F68B-4424-8637-142E37A0D21D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D383144D-760E-43CB-9DA2-F8538351E9DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99843572-BD65-4295-80B9-F66BD51DEC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFCEC5C5-0012-427E-93FF-77EF7E223843\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C210C2F0-00CC-4B39-8878-50EBE82F5D5C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4169BC86-23FA-4DA5-8CF2-E6E345D29C50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.24-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A1BCBF-4FE9-4E9C-8E8E-34A12219695A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.24-4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1822FE4F-E868-4A22-9F15-4377F7152F1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04501CA9-7065-418F-BD66-3F5583A98EC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.25.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"770DC711-9D0D-4C16-ACD3-60325871425D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95D33099-E1A4-4F9F-B71F-84C1AAF902C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54FD038E-FAE8-4485-AEF1-2650DFCCE412\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E7B8032-CE81-46F1-A535-BF77CEA2E750\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB7B65D-69AD-43C8-8D2F-F1D105CA2A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4362A0-1F93-49CE-AB13-1F20F2750A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4F33502-B33D-46EE-82B7-0E1F18025792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85648BEC-84D5-40F8-8795-10300439B030\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38BA4C83-97F2-482D-A90A-857E59D9AB72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.91:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91AAB582-24EC-4E2F-BA91-F2A6243F8630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.92:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA3F17BC-6773-49A6-B694-1346214C46BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.93:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82E7CA02-E38D-4AE9-982C-5F633EE2173D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.95:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F8D2DA-9BCB-4BCD-AE97-081FD32AC063\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.96:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62956DD4-E0EA-4F77-8096-9A38EA6BD2AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.97:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5896A49D-4A85-482B-8FC6-EB64B46E9708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.98:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67AB182B-4717-41A6-9E1E-0BD0092F89EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.99:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"749972F2-3C9D-4BB5-9FC9-A74058CE22FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DB2C56C-B499-4458-8431-6647214296B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.101-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A7190DD-2C43-47D0-9522-3EBF80D35D0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.101-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E2F0A24-D157-48A1-8362-BF6E0200BD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.49.102:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"197A71D7-B842-43EF-8BAC-A435CB96C8BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.50:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65E2496E-980C-4601-9968-D07A83F6B779\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.50.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C62FB0DC-C6FB-423C-8159-7886AC95883A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D2A3DA5-00B1-455B-9A5C-0BB4043EAFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.1-1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C006762E-5ECA-45C1-80AF-1AE5A98C4CBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.1-2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"297D7A95-7F46-47DC-BF90-5DED5AEDC373\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AF7C394-11A7-4AA9-B72C-3028BA0D6061\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE05CF61-F32D-4862-A9F3-384AEF98755A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5890B69-4E8F-4B0A-BA8C-18A01A11FF72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DECE8AE-015B-42BB-A0A2-3192DCF968F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24A78064-A114-44EC-8936-5F064B0A1BFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.7-3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F11C3022-95F0-41D3-A824-4F70B5D4468C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.7-7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32722C4B-C23C-4F51-A54E-A744B114BE37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD4B94C0-A3F0-4076-8075-EFF86B0359C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55D58044-BF62-435F-ABA3-2A4F9D323335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19B33E65-C34D-4589-825E-D788B4A0899E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E5AFABF-0AEF-47F7-B51B-5E60021123CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.51.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C66D2E0-03EC-4C1A-BD01-310E76D301D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADA3464-A31C-4556-963C-0CC73BF10F7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DC755D-70AD-42A6-B990-C91CD063D56A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFB6E5ED-C5A2-44C9-8F6C-F332258A017C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D043D02-D7EE-42F1-BDE5-5E16D10E455B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ED9536E-A9C0-4B60-B330-B265CA12632D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"317F022A-FC59-4033-8086-D609DE0C16B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.52.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F29BA6C-C6CA-4CF5-B919-8F77D0FA24D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2222BCE3-75AA-473D-9C28-6F708F27172D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0515C928-F8BE-491C-8995-81C4CC827D8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522915FA-1AA9-4A16-AAB2-EC55EEC546CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F808BC0E-501A-4EE0-80A1-3165C645A150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98646375-CBBE-4669-9A3D-65F8A9A4C540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43C14B41-39D5-47D4-AA3B-8E26F2846561\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A38075F6-838B-4D52-BDA3-D8141501E4CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F616B07-AD79-46CC-A0D4-D5A6B8492FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.53.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC54A41A-19FE-4EA9-8C82-8462D7ED6145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C3858B7-AF42-428A-80FB-1717C8909514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A6D35EB-A4B7-4BAD-A1FC-C687AB9235E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4F0CA3C-C125-437A-B903-DEF821B8B465\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62179F77-109F-4212-9EA7-EBC4DAD28B6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"024DCC55-7138-48A0-86CF-97BF27B4A100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2B1908E-212E-4B44-B1D1-D61B5F45E5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3B634C6-1578-485F-8028-AD068558487F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D561C4B9-152B-4CDA-9464-A4AEDAC8E237\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.54.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"490B2B5E-092E-4913-B370-02FF64352FBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.55:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AF79046-B1FF-4752-98D5-47CC218A1235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77837224-3E64-4023-B36F-1010DCF1738B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F93F1CB-3CA0-4532-A020-521B2349B9A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D0B9619-1377-4EB7-AFE0-459C205E75A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC35EB5B-E05A-4A97-8E15-2E222499C7B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8ECC0A0-2502-41BC-9EFA-3127FC427729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46AFB5EE-5180-4813-99A4-DE41F55D6BEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55F2035B-3E21-49A5-96F9-F261142B3E22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF37ECF-3B2F-4146-9401-95213FE941FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D058C626-6520-41D4-AB58-115DB0E7E00D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D6E93F5-88B0-4F4D-961B-1668699E0A44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A5186D3-4D8D-40BB-AD44-7FA7202CBA8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"314E88ED-5E55-4C9D-9644-303D02DE7434\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"821DDCA4-AD16-421B-9A9E-391EBE04C0B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9087F549-D533-47E2-A2F2-7EF58F5F8430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F9DF14D-F111-45E7-B436-577DB5481324\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF62F9D1-A8C5-4FA8-A574-021E5C84719A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A6B6296-B0BB-4188-926C-7B1C557A6491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:miloslav_trmac:libuser:0.56.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FBE225-7C41-446C-86E2-3571BC80A762\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/42891\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42966\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43047\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://securitytracker.com/id?1024960\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:019\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.osvdb.org/70421\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0170.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/45791\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0184\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0201\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0226\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=643227\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/64677\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053365.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053378.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/42891\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/42966\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43047\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securitytracker.com/id?1024960\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:019\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/70421\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0170.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/45791\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0201\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0226\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=643227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/64677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://fedorahosted.org/libuser/browser/NEWS?rev=libuser-0.57\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…