CVE-2019-19882

Name
CVE-2019-19882
Description
shadow 4.8, in certain circumstances affecting at least Gentoo, Arch Linux, and Void Linux, allows local users to obtain root access because setuid programs are misconfigured. Specifically, this affects shadow 4.8 when compiled using --with-libpam but without explicitly passing --disable-account-tools-setuid, and without a PAM configuration suitable for use with setuid account management tools. This combination leads to account management tools (groupadd, groupdel, groupmod, useradd, userdel, usermod) that can easily be used by unprivileged local users to escalate privileges to root in multiple ways. This issue became much more relevant in approximately December 2019 when an unrelated bug was fixed (i.e., the chmod calls to suidusbins were fixed in the upstream Makefile which is now included in the release version 4.8).
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://bugs.archlinux.org/task/64836
Patch https://github.com/shadow-maint/shadow/pull/199
Patch https://github.com/void-linux/void-packages/pull/17580
Exploit https://bugs.gentoo.org/702252
Patch https://github.com/shadow-maint/shadow/commit/edf7547ad5aa650be868cf2dac58944773c12d75
GENTOO https://security.gentoo.org/glsa/202008-09

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:shadow_project:shadow:4.8:*:*:*:*:*:*:* shadow == None == 4.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status