Логотип exploitDog
bind:CVE-2018-7169
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-7169

Количество 8

Количество 8

ubuntu логотип

CVE-2018-7169

почти 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
EPSS: Низкий
redhat логотип

CVE-2018-7169

около 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2018-7169

почти 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
EPSS: Низкий
debian логотип

CVE-2018-7169

почти 8 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is ...

CVSS3: 5.3
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2018:0667-1

почти 8 лет назад

Security update for shadow

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2018:0662-1

почти 8 лет назад

Security update for shadow

EPSS: Низкий
github логотип

GHSA-m2px-jr9v-8hhp

больше 3 лет назад

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2022-00731

почти 8 лет назад

Уязвимость компонента /proc/self/setgroups утилиты для управления учетными записями shadow, связанная с неправильным назначением разрешений для файлов, позволяющая нарушителю повысить свои привилегии

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-7169

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
0%
Низкий
почти 8 лет назад
redhat логотип
CVE-2018-7169

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 4.4
0%
Низкий
около 8 лет назад
nvd логотип
CVE-2018-7169

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
0%
Низкий
почти 8 лет назад
debian логотип
CVE-2018-7169

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is ...

CVSS3: 5.3
0%
Низкий
почти 8 лет назад
suse-cvrf логотип
openSUSE-SU-2018:0667-1

Security update for shadow

0%
Низкий
почти 8 лет назад
suse-cvrf логотип
SUSE-SU-2018:0662-1

Security update for shadow

0%
Низкий
почти 8 лет назад
github логотип
GHSA-m2px-jr9v-8hhp

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgroups knob) to prevent this sort of privilege escalation.

CVSS3: 5.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2022-00731

Уязвимость компонента /proc/self/setgroups утилиты для управления учетными записями shadow, связанная с неправильным назначением разрешений для файлов, позволяющая нарушителю повысить свои привилегии

CVSS3: 5.3
0%
Низкий
почти 8 лет назад

Уязвимостей на страницу