4.6
CVSSv2

CVE-2018-1113

Published: 03/07/2018 Updated: 09/10/2019
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.3 | Impact Score: 3.4 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

setup before version 2.11.4-1.fc28 in Fedora and Red Hat Enterprise Linux added /sbin/nologin and /usr/sbin/nologin to /etc/shells. This violates security assumptions made by pam_shells and some daemons which allow access based on a user's shell being listed in /etc/shells. Under some circumstances, users which had their shell changed to /sbin/nologin could still access the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

redhat setup

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

Vendor Advisories

Synopsis Low: setup security and bug fix update Type/Severity Security Advisory: Low Topic An update for setup is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which giv ...
Setup in Amazon Linux 2 added /sbin/nologin and /usr/sbin/nologin to /etc/shells This violates security assumptions made by pam_shells and some daemons which allow access based on a user's shell being listed in /etc/shells Under some circumstances, users which had their shell changed to /sbin/nologin could still access the system (CVE-2018-1113 ...
Setup in Fedora and Red Hat Enterprise Linux added /sbin/nologin and /usr/sbin/nologin to /etc/shells This violates security assumptions made by pam_shells and some daemons which allow access based on a user's shell being listed in /etc/shells Under some circumstances, users which had their shell changed to /sbin/nologin could still access the s ...