CVE-2018-7169Incorrect Permission Assignment in Project Shadow

Severity
5.3MEDIUMNVD
OSV9.8
EPSS
0.2%
top 56.03%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedFeb 15
Latest updateMay 13

Description

An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.g., chmod g-rwx) to restrict access to paths. This flaw effectively reverts a security feature in the kernel (in particular, the /proc/self/setgrou

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

Debianshadow_project/shadow< 1:4.7-1+3
Ubuntushadow_project/shadow< 1:4.5-1ubuntu2.2+2

🔴Vulnerability Details

4
GHSA
GHSA-m2px-jr9v-8hhp: An issue was discovered in shadow 42022-05-13
OSV
shadow vulnerabilities2022-01-27
CVEList
CVE-2018-7169: An issue was discovered in shadow 42018-02-15
OSV
CVE-2018-7169: An issue was discovered in shadow 42018-02-15

📋Vendor Advisories

3
Ubuntu
shadow vulnerabilities2022-01-27
Debian
CVE-2018-7169: shadow - An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and...2018
Red Hat
shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation2017-11-14

📐Framework References

1
ATT&CK
Exploit Public-Facing Application

💬Community

2
Bugzilla
CVE-2018-7169 shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation [fedora-all]2018-02-16
Bugzilla
CVE-2018-7169 shadow-utils: newgidmap allows unprivileged user to drop supplementary groups potentially allowing privilege escalation2018-02-16
CVE-2018-7169 — Incorrect Permission Assignment | cvebase