Description
GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3611-1 | inetutils security update |
Ubuntu USN |
USN-6304-1 | Inetutils vulnerabilities |
Ubuntu USN |
USN-7781-1 | Inetutils vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-02T18:31:53.432Z
Reserved: 2023-08-14T00:00:00.000Z
Link: CVE-2023-40303
No data.
Status : Modified
Published: 2023-08-14T05:15:10.233
Modified: 2024-11-21T08:19:11.747
Link: CVE-2023-40303
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Ubuntu USN