CVE Vulnerabilities

CVE-2023-40303

Unchecked Return Value

Published: Aug 14, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

Weakness

The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

Affected Software

NameVendorStart VersionEnd Version
InetutilsGnu*2.4 (including)
InetutilsUbuntubionic*
InetutilsUbuntudevel*
InetutilsUbuntuesm-apps/bionic*
InetutilsUbuntuesm-apps/focal*
InetutilsUbuntuesm-apps/jammy*
InetutilsUbuntuesm-apps/xenial*
InetutilsUbuntuesm-infra-legacy/trusty*
InetutilsUbuntufocal*
InetutilsUbuntujammy*
InetutilsUbuntulunar*
InetutilsUbuntumantic*
InetutilsUbuntunoble*
InetutilsUbuntuoracular*
InetutilsUbuntuplucky*
InetutilsUbuntutrusty*
InetutilsUbuntutrusty/esm*
InetutilsUbuntuupstream*
InetutilsUbuntuxenial*

Potential Mitigations

References