CVE-2019-19882
CVSS V2 Medium 6.9
CVSS V3 High 7.8
Description
shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).
Overview
- CVE ID
- CVE-2019-19882
- Assigner
- cve@mitre.org
- Vulnerability Status
- Modified
- Published Version
- 2019-12-18T16:15:26
- Last Modified Date
- 2020-08-25T15:15:11
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:shadow_project:shadow:4.8:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:L/AC:M/Au:N/C:C/I:C/A:C
- Access Vector
- LOCAL
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- COMPLETE
- Integrity Impact
- COMPLETE
- Availability Impact
- COMPLETE
- Base Score
- 6.9
- Severity
- MEDIUM
- Exploitability Score
- 3.4
- Impact Score
- 10
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.8
- Base Severity
- HIGH
- Exploitability Score
- 1.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://bugs.archlinux.org/task/64836 | Exploit Third Party Advisory |
https://github.com/shadow-maint/shadow/pull/199 | Patch Third Party Advisory |
https://github.com/void-linux/void-packages/pull/17580 | Patch Third Party Advisory |
https://bugs.gentoo.org/702252 | Exploit Third Party Advisory |
https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75 | Patch Third Party Advisory |
https://security.gentoo.org/glsa/202008-09 |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2019-19882 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19882 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 16:28:29 | Added to TrackCVE | |||
2022-12-04 08:05:29 | 2019-12-18T16:15Z | 2019-12-18T16:15:26 | CVE Published Date | updated |
2022-12-04 08:05:29 | 2020-08-25T15:15:11 | CVE Modified Date | updated | |
2022-12-04 08:05:29 | Modified | Vulnerability Status | updated |