CVE-2017-12424

In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:shadow_project:shadow:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 03:09

Type Values Removed Values Added
References () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630 - Issue Tracking, Third Party Advisory () https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630 - Issue Tracking, Third Party Advisory
References () https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675 - Issue Tracking, Third Party Advisory () https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675 - Issue Tracking, Third Party Advisory
References () https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952 - Patch, Third Party Advisory () https://github.com/shadow-maint/shadow/commit/954e3d2e7113e9ac06632aee3c69b8d818cc8952 - Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/201710-16 - Third Party Advisory () https://security.gentoo.org/glsa/201710-16 - Third Party Advisory

Information

Published : 2017-08-04 09:29

Updated : 2024-11-21 03:09


NVD link : CVE-2017-12424

Mitre link : CVE-2017-12424

CVE.ORG link : CVE-2017-12424


JSON object : View

Products Affected

debian

  • debian_linux

shadow_project

  • shadow
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer