75 lines
3.0 KiB
JSON
Raw Normal View History

{
"id": "CVE-2024-56433",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-26T09:15:07.267",
"lastModified": "2024-12-26T09:15:07.267",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid."
},
{
"lang": "es",
"value": "shadow-utils (tambi\u00e9n conocido como shadow) 4.4 a 4.17.0 establece un comportamiento predeterminado para /etc/subuid (por ejemplo, uid 100000 a 165535 para la primera cuenta de usuario) que puede entrar en conflicto de manera realista con los uid de los usuarios definidos en redes administradas localmente, lo que puede llevar a la apropiaci\u00f3n de cuentas, por ejemplo, al aprovechar newuidmap para acceder a un directorio de inicio de NFS (o recursos del mismo host en el caso de inicios de sesi\u00f3n remotos por parte de estos usuarios de la red local). NOTA: tambi\u00e9n se puede argumentar que los administradores del sistema no deber\u00edan haber asignado uid, dentro de las redes locales, que est\u00e9n dentro del rango que puede aparecer en /etc/subuid."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.6,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1188"
}
]
}
],
"references": [
{
"url": "https://github.com/shadow-maint/shadow/blob/e2512d5741d4a44bdd81a8c2d0029b6222728cf0/etc/login.defs#L238-L241",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/shadow-maint/shadow/issues/1157",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/shadow-maint/shadow/releases/tag/4.4",
"source": "cve@mitre.org"
}
]
}