SB2019122023 - Privilege escalation in shadow



SB2019122023 - Privilege escalation in shadow

Published: December 20, 2019 Updated: January 29, 2020

Security Bulletin ID SB2019122023
Severity
Low
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-19882)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to missconfigured setuid programs in shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools.. A local unprivileged user can leverage groupadd, groupdel, groupmod, useradd, userdel, or usermod management tools to escalate privileges on the system to root.

The issue affects at least Gentoo, Arch Linux, and Void Linux.


Remediation

Install update from vendor's website.