Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
References
Link | Resource |
---|---|
http://www.debian.org/security/2017/dsa-3793 | |
http://www.openwall.com/lists/oss-security/2016/07/19/6 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/19/7 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/20/2 | Mailing List Third Party Advisory |
http://www.openwall.com/lists/oss-security/2016/07/25/7 | Mailing List Patch Third Party Advisory |
http://www.securityfocus.com/bid/92055 | Third Party Advisory VDB Entry |
https://bugzilla.suse.com/show_bug.cgi?id=979282 | Issue Tracking Patch |
https://github.com/shadow-maint/shadow/issues/27 | Issue Tracking Patch Third Party Advisory |
https://security.gentoo.org/glsa/201706-02 |
Configurations
History
No history.
Information
Published : 2017-02-17 17:59
Updated : 2017-11-04 01:29
NVD link : CVE-2016-6252
Mitre link : CVE-2016-6252
CVE.ORG link : CVE-2016-6252
JSON object : View
Products Affected
shadow_project
- shadow
CWE
CWE-190
Integer Overflow or Wraparound