Lucene search

K
cveRedhatCVE-2018-1113
HistoryJul 03, 2018 - 1:29 a.m.

CVE-2018-1113

2018-07-0301:29:00
CWE-285
CWE-732
redhat
web.nvd.nist.gov
184
cve-2018-1113
setup
version 2.11.4-1.fc28
fedora
red hat enterprise linux
/etc/shells
pam_shells
daemons
security vulnerability
nvd

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

23.1%

setup before version 2.11.4-1.fc28 in Fedora and Red Hat Enterprise Linux added /sbin/nologin and /usr/sbin/nologin to /etc/shells. This violates security assumptions made by pam_shells and some daemons which allow access based on a user’s shell being listed in /etc/shells. Under some circumstances, users which had their shell changed to /sbin/nologin could still access the system.

Affected configurations

Nvd
Vulners
Node
redhatsetupRange<2.11.4
AND
fedoraprojectfedoraMatch-
OR
redhatenterprise_linuxMatch-
Node
redhatenterprise_linux_desktopMatch7.0
OR
redhatenterprise_linux_serverMatch7.0
OR
redhatenterprise_linux_workstationMatch7.0
VendorProductVersionCPE
redhatsetup*cpe:2.3:a:redhat:setup:*:*:*:*:*:*:*:*
fedoraprojectfedora-cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
redhatenterprise_linux-cpe:2.3:o:redhat:enterprise_linux:-:*:*:*:*:*:*:*
redhatenterprise_linux_desktop7.0cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
redhatenterprise_linux_server7.0cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
redhatenterprise_linux_workstation7.0cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "setup",
    "vendor": "[UNKNOWN]",
    "versions": [
      {
        "status": "affected",
        "version": "setup 2.11.4-1.fc28"
      }
    ]
  }
]

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

5.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

23.1%