Логотип exploitDog
bind:CVE-2024-56433
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-56433

Количество 10

Количество 10

ubuntu логотип

CVE-2024-56433

около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
EPSS: Низкий
redhat логотип

CVE-2024-56433

около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
EPSS: Низкий
nvd логотип

CVE-2024-56433

около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
EPSS: Низкий
msrc логотип

CVE-2024-56433

5 месяцев назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
EPSS: Низкий
debian логотип

CVE-2024-56433

около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /et ...

CVSS3: 3.6
EPSS: Низкий
rocky логотип

RLSA-2025:20559

3 месяца назад

Low: shadow-utils security update

EPSS: Низкий
rocky логотип

RLSA-2025:20145

2 месяца назад

Low: shadow-utils security update

EPSS: Низкий
github логотип

GHSA-7683-vm2j-m4cc

около 1 года назад

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
EPSS: Низкий
oracle-oval логотип

ELSA-2025-20559-0

3 месяца назад

ELSA-2025-20559-0: shadow-utils security update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20145-0

3 месяца назад

ELSA-2025-20145-0: shadow-utils security update (LOW)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-56433

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
5%
Низкий
около 1 года назад
redhat логотип
CVE-2024-56433

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
5%
Низкий
около 1 года назад
nvd логотип
CVE-2024-56433

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
5%
Низкий
около 1 года назад
msrc логотип
CVE-2024-56433

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
5%
Низкий
5 месяцев назад
debian логотип
CVE-2024-56433

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /et ...

CVSS3: 3.6
5%
Низкий
около 1 года назад
rocky логотип
RLSA-2025:20559

Low: shadow-utils security update

5%
Низкий
3 месяца назад
rocky логотип
RLSA-2025:20145

Low: shadow-utils security update

5%
Низкий
2 месяца назад
github логотип
GHSA-7683-vm2j-m4cc

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.

CVSS3: 3.6
5%
Низкий
около 1 года назад
oracle-oval логотип
ELSA-2025-20559-0

ELSA-2025-20559-0: shadow-utils security update (LOW)

3 месяца назад
oracle-oval логотип
ELSA-2025-20145-0

ELSA-2025-20145-0: shadow-utils security update (LOW)

3 месяца назад

Уязвимостей на страницу