CVE-2017-12424

CRITICAL

Shadow <4.5 - Memory Corruption

Title source: llm
STIX 2.1

Description

In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.

References (5)

Core 5
Core References
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=756630
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201710-16
Issue Tracking, Third Party Advisory x_refsource_confirm
https://bugs.launchpad.net/ubuntu/+source/shadow/+bug/1266675
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2021/03/msg00020.html

Scores

CVSS v3 9.8
EPSS 0.0058
EPSS Percentile 69.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-119
Status published
Products (2)
debian/debian_linux 9.0
shadow_project/shadow < 4.5
Published Aug 04, 2017
Tracked Since Feb 18, 2026