Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges.
Metrics
Affected Vendors & Products
References
History
Thu, 10 Oct 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ubuntu
Ubuntu authd |
|
CPEs | cpe:2.3:a:ubuntu:authd:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ubuntu
Ubuntu authd |
|
Metrics |
ssvc
|
Thu, 10 Oct 2024 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Authd, through version 0.3.6, did not sufficiently randomize user IDs to prevent collisions. A local attacker who can register user names could spoof another user's ID and gain their privileges. | |
Weaknesses | CWE-286 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: canonical
Published: 2024-10-10T13:42:31.950Z
Updated: 2024-10-10T14:55:40.228Z
Reserved: 2024-09-27T23:20:44.757Z
Link: CVE-2024-9312
Vulnrichment
Updated: 2024-10-10T14:55:35.358Z
NVD
Status : Awaiting Analysis
Published: 2024-10-10T14:15:05.863
Modified: 2024-10-15T12:58:51.050
Link: CVE-2024-9312
Redhat
No data.