7.8
CVSSv3

CVE-2023-40303

Published: 14/08/2023 Updated: 02/01/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

GNU inetutils prior to 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

Vulnerable Product Search on Vulmon Subscribe to Product

gnu inetutils

Vendor Advisories

Debian Bug report logs - #1049365 inetutils: CVE-2023-40303 Package: src:inetutils; Maintainer for src:inetutils is Guillem Jover <guillem@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 14 Aug 2023 18:45:02 UTC Severity: important Tags: security, upstream Found in version inetutils/2:2 ...

Mailing Lists

On Sat, Dec 30, 2023 at 05:26:00PM +0100, Solar Designer wrote: This is CVE-2023-40303 Debian also patched the issues in LTS: listsdebianorg/debian-lts-announce/2023/10/msg00013html There's still the supposedly-cannot-fail memory allocation on setuid(), where it contains a supposedly-unreachable error return code Back then, I ...