← Back to CVEs
CVE-2024-56433
LOW3.6
Description
shadow-utils (aka shadow) 4.4 through 4.17.0 establishes a default /etc/subuid behavior (e.g., uid 100000 through 165535 for the first user account) that can realistically conflict with the uids of users defined on locally administered networks, potentially leading to account takeover, e.g., by leveraging newuidmap for access to an NFS home directory (or same-host resources in the case of remote logins by these local network users). NOTE: it may also be argued that system administrators should not have assigned uids, within local networks, that are within the range that can occur in /etc/subuid.
CVE Details
CVSS v3.1 Score3.6
SeverityLOW
CVSS VectorCVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Attack VectorLOCAL
ComplexityHIGH
Privileges RequiredLOW
User InteractionNONE
Published12/26/2024
Last Modified12/26/2024
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-1188
References
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.