EulerOS Virtualization 2.10.0 : shadow (EulerOS-SA-2023-2568)

low Nessus Plugin ID 179255

Synopsis

The remote EulerOS Virtualization host is missing a security update.

Description

According to the versions of the shadow package installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities :

- In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that 'cat /etc/passwd' shows a rogue user account. (CVE-2023-29383)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected shadow packages.

See Also

http://www.nessus.org/u?43e4dfb4

Plugin Details

Severity: Low

ID: 179255

File Name: EulerOS_SA-2023-2568.nasl

Version: 1.0

Type: local

Published: 8/2/2023

Updated: 8/2/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 1.7

Temporal Score: 1.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2023-29383

CVSS v3

Risk Factor: Low

Base Score: 3.3

Temporal Score: 3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:shadow, cpe:/o:huawei:euleros:uvp:2.10.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/2/2023

Vulnerability Publication Date: 4/14/2023

Reference Information

CVE: CVE-2023-29383