Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-56433

Опубликовано: 26 дек. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 3.6

Описание

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

РелизСтатусПримечание
devel

deferred

2025-03-17
esm-infra-legacy/trusty

deferred

2025-03-17
esm-infra/bionic

deferred

2025-03-17
esm-infra/focal

deferred

2025-03-17
esm-infra/xenial

deferred

2025-03-17
focal

ignored

end of standard support, was deferred [2025-03-17]
jammy

deferred

2025-03-17
noble

deferred

2025-03-17
oracular

ignored

end of life, was deferred [2025-03-17]
plucky

ignored

end of life, was deferred [2025-03-17]

Показывать по

EPSS

Процентиль: 89%
0.04509
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 3.6
redhat
около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
nvd
около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
msrc
5 месяцев назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
debian
около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /et ...

rocky
3 месяца назад

Low: shadow-utils security update

EPSS

Процентиль: 89%
0.04509
Низкий

3.6 Low

CVSS3