Current Description

login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server.

Basic Data

PublishedJuly 13, 1998
Last ModifiedOctober 18, 2016
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.


  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3OSSlackwareSlackware Linux3.1*******
    2.3OSSlackwareSlackware Linux3.2*******
    2.3OSSlackwareSlackware Linux3.3*******
    2.3OSSlackwareSlackware Linux3.4*******
    2.3OSSlackwareSlackware Linux3.5*******

Vulnerable Software List

Slackware Slackware Linux 3.1, 3.2, 3.3, 3.4, 3.5


19980713 Slackware Shadow Insecurity