Логотип exploitDog
bind:CVE-2023-29383
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-29383

Количество 12

Количество 12

ubuntu логотип

CVE-2023-29383

почти 3 года назад

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
EPSS: Низкий
redhat логотип

CVE-2023-29383

почти 3 года назад

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2023-29383

почти 3 года назад

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
EPSS: Низкий
msrc логотип

CVE-2023-29383

почти 3 года назад

In Shadow 4.13 it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g. adding a new user fails because \n is in the block list) it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words an adversary may be able to convince a system administrator to take the system offline (an indirect social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
EPSS: Низкий
debian логотип

CVE-2023-29383

почти 3 года назад

In Shadow 4.13, it is possible to inject control characters into field ...

CVSS3: 3.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2070-1

почти 3 года назад

Security update for shadow

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2069-1

почти 3 года назад

Security update for shadow

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2068-1

почти 3 года назад

Security update for shadow

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2067-1

почти 3 года назад

Security update for shadow

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2066-1

почти 3 года назад

Security update for shadow

EPSS: Низкий
github логотип

GHSA-p9w4-8hh8-crcx

почти 3 года назад

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
EPSS: Низкий
fstec логотип

BDU:2024-06940

почти 3 года назад

Уязвимость утилиты для управления учетными записями Shadow, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 3.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-29383

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
0%
Низкий
почти 3 года назад
redhat логотип
CVE-2023-29383

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 5.5
0%
Низкий
почти 3 года назад
nvd логотип
CVE-2023-29383

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
0%
Низкий
почти 3 года назад
msrc логотип
CVE-2023-29383

In Shadow 4.13 it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g. adding a new user fails because \n is in the block list) it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words an adversary may be able to convince a system administrator to take the system offline (an indirect social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
0%
Низкий
почти 3 года назад
debian логотип
CVE-2023-29383

In Shadow 4.13, it is possible to inject control characters into field ...

CVSS3: 3.3
0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2070-1

Security update for shadow

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2069-1

Security update for shadow

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2068-1

Security update for shadow

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2067-1

Security update for shadow

0%
Низкий
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:2066-1

Security update for shadow

0%
Низкий
почти 3 года назад
github логотип
GHSA-p9w4-8hh8-crcx

In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.

CVSS3: 3.3
0%
Низкий
почти 3 года назад
fstec логотип
BDU:2024-06940

Уязвимость утилиты для управления учетными записями Shadow, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных

CVSS3: 3.3
0%
Низкий
почти 3 года назад

Уязвимостей на страницу