Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-7169

Опубликовано: 14 нояб. 2017
Источник: redhat
CVSS3: 4.4

Описание

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

An issue was discovered in newgidmap, in shadow-utils, that allows an unprivileged user to be placed in a user namespace where setgroups is permitted. An attacker could use this flaw to remove himself from a supplementary group, which may allow access to certain filesystem paths, if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths.

Отчет

This issue did not affect the versions of shadow-utils as shipped with Red Hat Enterprise Linux 5, 6 and 7 as they did not provide newgidmap program.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5shadow-utilsNot affected
Red Hat Enterprise Linux 6shadow-utilsNot affected
Red Hat Enterprise Linux 7shadow-utilsNot affected
Red Hat Enterprise Linux 8shadow-utilsNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-271
https://bugzilla.redhat.com/show_bug.cgi?id=1546241shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation

4.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
nvd
почти 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
debian
почти 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is ...

suse-cvrf
почти 8 лет назад

Security update for shadow

suse-cvrf
почти 8 лет назад

Security update for shadow

4.4 Medium

CVSS3