First published: Thu Jul 31 2014(Updated: )
In shadow before 4.5, the newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/shadow | 1:4.8.1-1 1:4.13+dfsg1-1 1:4.15.3-2 1:4.16.0-4 | |
Shadow Project | <4.5 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12424 has a high severity due to potential crashes and memory corruption from malformed input.
To fix CVE-2017-12424, upgrade to shadow versions 1:4.8.1-1, 1:4.13+dfsg1-1, 1:4.15.3-2, or 1:4.16.0-4.
CVE-2017-12424 affects shadow versions prior to 4.5.
CVE-2017-12424 may allow an attacker to exploit the vulnerability remotely through malformed input.
CVE-2017-12424 presents vulnerabilities that can lead to buffer overflow or other unspecified behaviors.