First published: Fri Apr 14 2023(Updated: )
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Shadow Project | =4.13 | |
=4.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29383 has been assigned a severity rating that indicates it poses a risk of misrepresenting user data.
To mitigate CVE-2023-29383, upgrading to a patched version of Shadow beyond 4.13 is recommended.
CVE-2023-29383 allows the injection of control characters into fields provided to the SUID program chfn.
CVE-2023-29383 is not directly exploitable to create new users but can misrepresent the /etc/passwd file in certain scenarios.
Shadow version 4.13 is affected by CVE-2023-29383.