Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-56433

Опубликовано: 26 дек. 2024
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS3: 3.6

Описание

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

РелизСтатусПримечание
devel

deferred

2025-03-17
esm-infra-legacy/trusty

deferred

2025-03-17
esm-infra/bionic

deferred

2025-03-17
esm-infra/focal

deferred

2025-03-17
esm-infra/xenial

deferred

2025-03-17
focal

ignored

end of standard support, was deferred [2025-03-17]
jammy

deferred

2025-03-17
noble

deferred

2025-03-17
oracular

ignored

end of life, was deferred [2025-03-17]
plucky

deferred

2025-03-17

Показывать по

EPSS

Процентиль: 89%
0.05074
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 3.6
redhat
11 месяцев назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
nvd
11 месяцев назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
msrc
3 месяца назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
debian
11 месяцев назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /et ...

CVSS3: 3.6
github
11 месяцев назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

EPSS

Процентиль: 89%
0.05074
Низкий

3.6 Low

CVSS3