Vulnerability Details CVE-2023-40303
GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.5%
CVSS Severity
CVSS v3 Score 7.8
Products affected by CVE-2023-40303
-
cpe:2.3:a:gnu:inetutils:-
-
cpe:2.3:a:gnu:inetutils:1.3.2
-
cpe:2.3:a:gnu:inetutils:1.3a
-
cpe:2.3:a:gnu:inetutils:1.3b
-
cpe:2.3:a:gnu:inetutils:1.4.0
-
cpe:2.3:a:gnu:inetutils:1.4.1
-
cpe:2.3:a:gnu:inetutils:1.4.2
-
cpe:2.3:a:gnu:inetutils:1.5
-
cpe:2.3:a:gnu:inetutils:1.6
-
cpe:2.3:a:gnu:inetutils:1.7
-
cpe:2.3:a:gnu:inetutils:1.8
-
cpe:2.3:a:gnu:inetutils:1.9
-
cpe:2.3:a:gnu:inetutils:1.9.1
-
cpe:2.3:a:gnu:inetutils:1.9.2
-
cpe:2.3:a:gnu:inetutils:1.9.3
-
cpe:2.3:a:gnu:inetutils:1.9.4
-
cpe:2.3:a:gnu:inetutils:2.2
-
cpe:2.3:a:gnu:inetutils:2.3