shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
History

Fri, 27 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Dec 2024 13:30:00 +0000

Type Values Removed Values Added
Title shadow-utils: Default subordinate ID configuration in /etc/login.defs could lead to compromise
References
Metrics threat_severity

None

threat_severity

Low


Thu, 26 Dec 2024 09:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1188
Metrics cvssV3_1

{'score': 3.6, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Thu, 26 Dec 2024 08:45:00 +0000

Type Values Removed Values Added
Description shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2024-12-26T00:00:00

Updated: 2024-12-27T14:48:48.272Z

Reserved: 2024-12-26T00:00:00

Link: CVE-2024-56433

cve-icon Vulnrichment

Updated: 2024-12-27T14:48:44.101Z

cve-icon NVD

Status : Received

Published: 2024-12-26T09:15:07.267

Modified: 2024-12-26T09:15:07.267

Link: CVE-2024-56433

cve-icon Redhat

Severity : Low

Publid Date: 2024-12-26T00:00:00Z

Links: CVE-2024-56433 - Bugzilla