First published: Wed Sep 26 2018(Updated: )
Privilege escalation can occur in the SUSE useradd.c code in useradd, as distributed in the SUSE shadow package through 4.2.1-27.9.1 for SUSE Linux Enterprise 12 (SLE-12) and through 4.5-5.39 for SUSE Linux Enterprise 15 (SLE-15). Non-existing intermediate directories are created with mode 0777 during user creation. Given that they are world-writable, local attackers might use this for privilege escalation and other unspecified attacks. NOTE: this would affect non-SUSE users who took useradd.c code from a 2014-04-02 upstream pull request; however, no non-SUSE distribution is known to be affected.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE shadow | <=4.2.1-27.9.1 | |
SUSE Linux Enterprise | =12.0 | |
SUSE shadow | <=4.5-5.39 | |
SUSE Linux Enterprise | =15.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-16588 is high with a CVSS score of 7.8.
CVE-2018-16588 occurs due to privilege escalation in the SUSE useradd.c code.
The SUSE shadow package versions 4.2.1-27.9.1 and 4.5-5.39 for SUSE Linux Enterprise 12 (SLE-12) and SUSE Linux Enterprise 15 (SLE-15) are affected.
To fix CVE-2018-16588, update the SUSE shadow package to a version that includes the necessary security patches.
More information about CVE-2018-16588 can be found at the following reference: http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00073.html