CVE-2016-6252
Publication date 17 February 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
Status
Package | Ubuntu Release | Status |
---|---|---|
shadow | ||
16.04 LTS xenial |
Fixed 1:4.2-3.1ubuntu5.2
|
|
14.04 LTS trusty |
Fixed 1:4.1.5.1-1ubuntu9.4
|
|
Notes
leosilva
shadow version for precise-esm and vivid/ubuntu-core doesn't use newuidmap binaries neither does any privileged access that makes this fix necessary.
Patch details
Package | Patch details |
---|---|
shadow |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Related Ubuntu Security Notices (USN)
- USN-3276-1
- shadow vulnerabilities
- 5 May 2017