Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-40303

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.5%
CVSS Severity
CVSS v3 Score 7.8
References
Products affected by CVE-2023-40303
  • Gnu » Inetutils » Version: N/A
    cpe:2.3:a:gnu:inetutils:-
  • Gnu » Inetutils » Version: 1.3.2
    cpe:2.3:a:gnu:inetutils:1.3.2
  • Gnu » Inetutils » Version: 1.3a
    cpe:2.3:a:gnu:inetutils:1.3a
  • Gnu » Inetutils » Version: 1.3b
    cpe:2.3:a:gnu:inetutils:1.3b
  • Gnu » Inetutils » Version: 1.4.0
    cpe:2.3:a:gnu:inetutils:1.4.0
  • Gnu » Inetutils » Version: 1.4.1
    cpe:2.3:a:gnu:inetutils:1.4.1
  • Gnu » Inetutils » Version: 1.4.2
    cpe:2.3:a:gnu:inetutils:1.4.2
  • Gnu » Inetutils » Version: 1.5
    cpe:2.3:a:gnu:inetutils:1.5
  • Gnu » Inetutils » Version: 1.6
    cpe:2.3:a:gnu:inetutils:1.6
  • Gnu » Inetutils » Version: 1.7
    cpe:2.3:a:gnu:inetutils:1.7
  • Gnu » Inetutils » Version: 1.8
    cpe:2.3:a:gnu:inetutils:1.8
  • Gnu » Inetutils » Version: 1.9
    cpe:2.3:a:gnu:inetutils:1.9
  • Gnu » Inetutils » Version: 1.9.1
    cpe:2.3:a:gnu:inetutils:1.9.1
  • Gnu » Inetutils » Version: 1.9.2
    cpe:2.3:a:gnu:inetutils:1.9.2
  • Gnu » Inetutils » Version: 1.9.3
    cpe:2.3:a:gnu:inetutils:1.9.3
  • Gnu » Inetutils » Version: 1.9.4
    cpe:2.3:a:gnu:inetutils:1.9.4
  • Gnu » Inetutils » Version: 2.2
    cpe:2.3:a:gnu:inetutils:2.2
  • Gnu » Inetutils » Version: 2.3
    cpe:2.3:a:gnu:inetutils:2.3


Contact Us

Shodan ® - All rights reserved