First published: Sat Jul 23 2016(Updated: )
Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/shadow | 1:4.5-1.1 1:4.8.1-1 1:4.13+dfsg1-1 1:4.13+dfsg1-2 1:4.13+dfsg1-3 | |
Shadow Project | =4.2.1 | |
=4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6252 is classified as a high severity vulnerability allowing local privilege escalation.
To fix CVE-2016-6252, upgrade the shadow package to version 1:4.5-1.1 or later.
All versions of shadow prior to 1:4.5-1.1, including version 4.2.1, are affected by CVE-2016-6252.
Local users can exploit CVE-2016-6252 to gain elevated privileges through crafted input.
CVE-2016-6252 involves an integer overflow in shadow that can be exploited to escalate privileges.