CVE-2024-56433Initialization of a Resource with an Insecure Default in Shadow-utils

Severity
3.6LOWNVD
EPSS
4.5%
top 10.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 26

Description

shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should n

CVSS vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:NExploitability: 1.0 | Impact: 2.5

Affected Packages1 packages

CVEListV5shadow-maint/shadow-utils4.44.17.0

🔴Vulnerability Details

3
OSV
CVE-2024-56433: shadow-utils (aka shadow) 42024-12-26
CVEList
CVE-2024-56433: shadow-utils (aka shadow) 42024-12-26
GHSA
GHSA-7683-vm2j-m4cc: shadow-utils (aka shadow) 42024-12-26

📋Vendor Advisories

3
Red Hat
shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise2024-12-26
Microsoft
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of us2024-12-10
Debian
CVE-2024-56433: shadow - shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid b...2024
CVE-2024-56433 — Shadow-utils vulnerability | cvebase