Shadow Project Shadow vulnerabilities

17 known vulnerabilities affecting shadow_project/shadow.

Total CVEs
17
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH6MEDIUM6LOW4

Vulnerabilities

Page 1 of 1
CVE-2023-4641MEDIUMCVSS 5.5≥ 0, < 1:4.8.1-1+deb11u1≥ 0, < 1:4.13+dfsg1-1+deb12u1+1 more2023-12-27
CVE-2023-4641 [MEDIUM] CVE-2023-4641: A flaw was found in shadow-utils A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
osv
CVE-2023-29383LOWCVSS 3.3v4.132023-04-14
CVE-2023-29383 [LOW] CWE-74 CVE-2023-29383: In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to
nvdosv
CVE-2017-20002HIGHCVSS 7.8≥ 0, < 1:4.5-12021-03-17
CVE-2017-20002 [HIGH] CVE-2017-20002: The Debian shadow package before 1:4 The Debian shadow package before 1:4.5-1 for Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing
osv
CVE-2019-19882HIGHCVSS 7.8v4.82019-12-18
CVE-2019-19882 [HIGH] CWE-732 CVE-2019-19882: shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows l shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable f
nvdosv
CVE-2013-4235MEDIUMCVSS 4.7≥ 0, < 1:4.12.3+dfsg1-12019-12-03
CVE-2013-4235 [MEDIUM] CVE-2013-4235: shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
osv
CVE-2005-4890HIGHCVSS 7.8≥ 0, < 1:4.1.5-12019-11-04
CVE-2005-4890 [HIGH] CVE-2005-4890: There is a possible tty hijacking in shadow 4 There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
osv
CVE-2017-2616MEDIUMCVSS 4.7≥ 0, < 1:4.4-42018-07-27
CVE-2017-2616 [MEDIUM] CVE-2017-2616: A race condition was found in util-linux before 2 A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.
osv
CVE-2018-7169MEDIUMCVSS 5.3v4.52018-02-15
CVE-2018-7169 [MEDIUM] CWE-732 CVE-2018-7169: An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivile An issue was discovered in shadow 4.5. newgidmap (in shadow-utils) is setuid and allows an unprivileged user to be placed in a user namespace where setgroups(2) is permitted. This allows an attacker to remove themselves from a supplementary group, which may allow access to certain filesystem paths if the administrator has used "group blacklisting" (e.
nvdosv
CVE-2017-12424CRITICALCVSS 9.8fixed in 4.52017-08-04
CVE-2017-12424 [CRITICAL] CWE-119 CVE-2017-12424: In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Contro
nvdosv
CVE-2016-6252HIGHCVSS 7.8v4.2.12017-02-17
CVE-2016-6252 [HIGH] CWE-190 CVE-2016-6252: Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidma Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
nvdosv
CVE-2011-0721MEDIUMCVSS 6.4≥ 0, < 1:4.1.4.2+svn3283-32011-02-19
CVE-2011-0721 [MEDIUM] CVE-2011-0721: Multiple CRLF injection vulnerabilities in (1) chfn and (2) chsh in shadow 1:4 Multiple CRLF injection vulnerabilities in (1) chfn and (2) chsh in shadow 1:4.1.4 allow local users to add new users or groups to /etc/passwd via the GECOS field.
osv
CVE-2008-5394HIGHCVSS 7.2PoC≥ 0, < 1:4.1.1-62008-12-09
CVE-2008-5394 [HIGH] CVE-2008-5394: /bin/login in shadow 4 /bin/login in shadow 4.0.18.1 in Debian GNU/Linux, and probably other Linux distributions, allows local users in the utmp group to overwrite arbitrary files via a symlink attack on a temporary file referenced in a line (aka ut_line) field in a utmp entry.
osv
CVE-2006-3378HIGHCVSS 7.2≥ 0, < 1:4.0.14-12006-07-06
CVE-2006-3378 [HIGH] CVE-2006-3378: passwd command in shadow in Ubuntu 5 passwd command in shadow in Ubuntu 5.04 through 6.06 LTS, when called with the -f, -g, or -s flag, does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits.
osv
CVE-2006-1174LOWCVSS 3.7≥ 0, < 1:4.0.15-102006-05-28
CVE-2006-1174 [LOW] CVE-2006-1174: useradd in shadow-utils before 4 useradd in shadow-utils before 4.0.3, and possibly other versions before 4.0.8, does not provide a required argument to the open function when creating a new user mailbox, which causes the mailbox to be created with unpredictable permissions and possibly allows attackers to read or modify the mailbox.
osv
CVE-2006-1844LOWCVSS 2.1≥ 0, < 1:4.0.14-92006-04-19
CVE-2006-1844 [LOW] CVE-2006-1844: The Debian installer for the (1) shadow 4 The Debian installer for the (1) shadow 4.0.14 and (2) base-config 2.53.10 packages includes sensitive information in world-readable log files, including preseeded passwords and pppoeconf passwords, which might allow local users to gain privileges.
osv
CVE-2006-1376LOWCVSS 2.1≥ 0, < 1:4.0.14-92006-03-24
CVE-2006-1376 [LOW] CVE-2006-1376: The installation of Debian GNU/Linux 3 The installation of Debian GNU/Linux 3.1r1 from the network install CD creates /var/log/debian-installer/cdebconf with world writable permissions, which allows local users to cause a denial of service (disk consumption).
osv
CVE-2004-1001MEDIUMCVSS 4.6≥ 0, < 1:4.0.3-352005-03-01
CVE-2004-1001 [MEDIUM] CVE-2004-1001: Unknown vulnerability in the passwd_check function in Shadow 4 Unknown vulnerability in the passwd_check function in Shadow 4.0.4.1, and possibly other versions before 4.0.5, allows local users to conduct unauthorized activities when an error from a pam_chauthtok function call is not properly handled.
osv