CVE-2024-56433 — Initialization of a Resource with an Insecure Default in Shadow-utils
Severity
3.6LOWNVD
EPSS
4.5%
top 10.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 26
Description
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should n…
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 1.0 | Impact: 2.5
Affected Packages1 packages
🔴Vulnerability Details
3📋Vendor Advisories
3Red Hat▶
shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise↗2024-12-26
Microsoft▶
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of us↗2024-12-10
Debian▶
CVE-2024-56433: shadow - shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid b...↗2024