-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2596-1 debian-...@lists.debian.org https://www.debian.org/lts/security/ Sylvain Beucler March 17, 2021 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : shadow Version : 1:4.4-4.1+deb9u1 CVE ID : CVE-2017-12424 CVE-2017-20002 Debian Bug : 756630 914957 Several vulnerabilities were discovered in the shadow suite of login tools. An attacker may escalate privileges in specific configurations. CVE-2017-20002 Shadow incorrectly lists pts/0 and pts/1 as physical terminals in /etc/securetty. This allows local users to login as password-less users even if they are connected by non-physical means such as SSH (hence bypassing PAM's nullok_secure configuration). This notably affects environments such as virtual machines automatically generated with a default blank root password, allowing all local users to escalate privileges. It should be noted however that /etc/securetty will be dropped in Debian 11/bullseye. CVE-2017-12424 The newusers tool could be made to manipulate internal data structures in ways unintended by the authors. Malformed input may lead to crashes (with a buffer overflow or other memory corruption) or other unspecified behaviors. This crosses a privilege boundary in, for example, certain web-hosting environments in which a Control Panel allows an unprivileged user account to create subaccounts. For Debian 9 stretch, these problems have been fixed in version 1:4.4-4.1+deb9u1. We recommend that you upgrade your shadow packages. For the detailed security status of shadow please refer to its security tracker page at: https://security-tracker.debian.org/tracker/shadow Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmBR/ToACgkQDTl9HeUl XjA89g//dGhD8r80YlY0Fsz/tXKIqdxZ+amDVNcmi5V5qmI76yMpSYVQNR7rXbcq d5LS8hMSvksextF9cwu9oo9JUXkY7mUg1O+dzehF9UtQn8Jv9BdQmt9Nn+O9jPmD ypKxHApNs0MfOmAvP7LZzykxmLovXGoyy+OpaxIAZpiNwzKRmifSa79kanm/41mr O8roJ4bV6wm2q7kvhBkR12kMaIM6ft8p3Fq4NXCQ/VVjydNYypn/rwAn/0JjQQvC AP606tEvRoApPhs9299q2YZ2tA3I6W2ZwjwiM+qgiOc3Hd8OnhQ/QInYy0YdC6iA h60xxj98kof8diwS9eYwntM6a1BwsM2XwK18Ye11odlwVUBap7uO7+LlxrqQz/gF CpAXyJiEZJE1t6yBAhGHhb2QzkbYXiq40aujZ7Tpu9VQJz76ARuchm78OELYy07Z r8Bvrz/DDt7sS0MfCEqRCvDhpH3Bh3FX5SG2nBBEpm5rMFDL5hND2541h/PEK35s ZBtlki4fU2YBqsALpGeW6QkvHRE3kyiZrDh9bdM/XtSXLaUmBLyBESoFUGxx+PMN ffNj84BgJsasLk+RQG/IHpNIjnwsrTnnWE5CyiMId1lA/em3tHHX2mW00hnCtV07 E3FOUo0mm5ljZiHz0qhodGRWTW3K6C1m3vb0I3COX6XzWx+6XNQ= =Nqeb -----END PGP SIGNATURE-----