Vulnerability Details : CVE-2023-40303
Potential exploit
GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.
Vulnerability category: Gain privilege
Products affected by CVE-2023-40303
- cpe:2.3:a:gnu:inetutils:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-40303
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 18 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-40303
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2023-40303
-
The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-40303
-
https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg00000.html
setuid/setgid return values not checked in rlogin, rsh, rshd and uucpdExploit;Mailing List;Patch;Vendor Advisory
-
https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6
inetutils.git - GNU InetutilsPatch
-
http://www.openwall.com/lists/oss-security/2023/12/30/4
oss-security - Re: inetutils ftpd, rcp, rlogin, rsh, rshd, uucpd: Avoid potential privilege escalations by checking set*id() return values
-
https://lists.debian.org/debian-lts-announce/2023/10/msg00013.html
[SECURITY] [DLA 3611-1] inetutils security update
-
https://ftp.gnu.org/gnu/inetutils/
Index of /gnu/inetutilsProduct
Jump to