In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "libsubid-dev" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "libsubid4" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "libsubid4-dbgsym" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "login" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "login-dbgsym" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "passwd" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "passwd-dbgsym" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "uidmap" }, { "binary_version": "1:4.13+dfsg1-4ubuntu1", "binary_name": "uidmap-dbgsym" } ] }