2 results (0.008 seconds)

CVSS: 3.6EPSS: 3%CPEs: 1EXPL: 1

26 Dec 2024 — shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assi... • https://github.com/JonnyWhatshisface/CVE-2024-56433 • CWE-1188: Initialization of a Resource with an Insecure Default •

CVSS: 5.5EPSS: 0%CPEs: 17EXPL: 0

13 Nov 2023 — A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory. Se encontró una falla en Shadow-Utils. • https://access.redhat.com/errata/RHSA-2023:6632 • CWE-287: Improper Authentication CWE-303: Incorrect Implementation of Authentication Algorithm •