Unrated severityNVD Advisory· Published Dec 21, 2006· Updated Apr 23, 2026
CVE-2006-6683
CVE-2006-6683
Description
Pedro Lineu Orso chetcpasswd 2.4.1 and earlier verifies and updates user accounts via custom code that processes /etc/shadow and does not follow the PAM configuration, which might allow remote attackers to bypass intended restrictions implemented through PAM.
Affected products
6cpe:2.3:a:pedro_lineu_orso:chetcpasswd:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:*:*:*:*:*:*:*:*range: <=2.4.1
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:1.12:*:*:*:*:*:*:*
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:pedro_lineu_orso:chetcpasswd:2.3.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- bugs.debian.org/cgi-bin/bugreport.cginvdVendor Advisory
- www.securityfocus.com/bid/21102nvdVendor Advisory
News mentions
0No linked articles in our index yet.