Vulnerabilities
Vulnerable Software
Shadow Project:  >> Shadow  >> 4.2.1  Security Vulnerabilities
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.
CVSS Score
9.8
EPSS Score
0.006
Published
2017-08-04
Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
CVSS Score
7.8
EPSS Score
0.001
Published
2017-02-17


Contact Us

Shodan ® - All rights reserved