CVE Vulnerabilities

CVE-2023-40303

Unchecked Return Value

Published: Aug 14, 2023 | Modified: Nov 21, 2024
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.

Weakness

The product does not check the return value from a method or function, which can prevent it from detecting unexpected states and conditions.

Affected Software

Name Vendor Start Version End Version
Inetutils Gnu * 2.4 (including)
Inetutils Ubuntu bionic *
Inetutils Ubuntu devel *
Inetutils Ubuntu focal *
Inetutils Ubuntu jammy *
Inetutils Ubuntu lunar *
Inetutils Ubuntu mantic *
Inetutils Ubuntu noble *
Inetutils Ubuntu oracular *
Inetutils Ubuntu trusty *
Inetutils Ubuntu trusty/esm *
Inetutils Ubuntu xenial *

Potential Mitigations

References