CVE-2019-19882
Summary
| CVE | CVE-2019-19882 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-12-18 16:15:00 UTC |
| Updated | 2020-08-25 15:15:00 UTC |
| Description | shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8). |
Risk And Classification
Problem Types: CWE-732
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Shadow Project | Shadow | 4.8 | All | All | All |
| Application | Shadow Project | Shadow | 4.8 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Shadow: Privilege escalation (GLSA 202008-09) — Gentoo security | GENTOO | security.gentoo.org | |
| FS#64836 : [shadow] useradd, groupadd, etc. are now setuid-root | MISC | bugs.archlinux.org | Exploit, Third Party Advisory |
| Fix failing chmod calls on installation for suidubins · shadow-maint/shadow@edf7547 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| 702252 – (CVE-2019-19882) <sys-apps/shadow-4.8-r3[pam] installs setuid binaries with permissive pam configuration allowing user/group management without authentication (CVE-2019-19882) | MISC | bugs.gentoo.org | Exploit, Third Party Advisory |
| Don't auto-enable ACCT_TOOLS_SETUID if PAM is detected by falconindy · Pull Request #199 · shadow-maint/shadow · GitHub | MISC | github.com | Patch, Third Party Advisory |
| shadow: reduce the number of suid programs by Duncaen · Pull Request #17580 · void-linux/void-packages · GitHub | MISC | github.com | Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.