5.5
CVE-2023-4641
- EPSS 0.02%
- Published 27.12.2023 16:15:13
- Last modified 21.11.2024 08:35:35
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
A flaw was found in shadow-utils. When asking for a new password, shadow-utils asks the password twice. If the password fails on the second attempt, shadow-utils fails in cleaning the buffer used to store the first entry. This may allow an attacker with enough access to retrieve the password from the memory.
Data is provided by the National Vulnerability Database (NVD)
Shadow-maint ≫ Shadow-utils Version < 4.14.0
Redhat ≫ Codeready Linux Builder Version8.0
Redhat ≫ Codeready Linux Builder Version9.0
Redhat ≫ Codeready Linux Builder For Arm64 Version8.0_aarch64
Redhat ≫ Codeready Linux Builder For Arm64 Version9.0_aarch64
Redhat ≫ Codeready Linux Builder For Ibm Z Systems Version8.0_s390x
Redhat ≫ Codeready Linux Builder For Ibm Z Systems Version9.0_s390x
Redhat ≫ Codeready Linux Builder For Power Little Endian Version8.0_ppc64le
Redhat ≫ Codeready Linux Builder For Power Little Endian Version9.0_ppc64le
Redhat ≫ Enterprise Linux Version8.0
Redhat ≫ Enterprise Linux Version9.0
Redhat ≫ Enterprise Linux For Arm 64 Version8.0
Redhat ≫ Enterprise Linux For Arm 64 Version9.0
Redhat ≫ Enterprise Linux For Ibm Z Systems Version8.0_s390x
Redhat ≫ Enterprise Linux For Ibm Z Systems Version9.0_s390x
Redhat ≫ Enterprise Linux For Power Little Endian Version8.0_ppc64le
Redhat ≫ Enterprise Linux For Power Little Endian Version9.0_ppc64le
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.02 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
secalert@redhat.com | 4.7 | 1 | 3.6 |
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-287 Improper Authentication
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
CWE-303 Incorrect Implementation of Authentication Algorithm
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.