{"id":"CVE-2023-40303","details":"GNU inetutils before 2.5 may allow privilege escalation because of unchecked return values of set*id() family functions in ftpd, rcp, rlogin, rsh, rshd, and uucpd. This is, for example, relevant if the setuid system call fails when a process is trying to drop privileges before letting an ordinary user control the activities of the process.","modified":"2026-04-02T09:21:24.476057Z","published":"2023-08-14T05:15:10.233Z","references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2023/12/30/4"},{"type":"WEB","url":"https://ftp.gnu.org/gnu/inetutils/"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00013.html"},{"type":"FIX","url":"https://git.savannah.gnu.org/cgit/inetutils.git/commit/?id=e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6"},{"type":"FIX","url":"https://lists.gnu.org/archive/html/bug-inetutils/2023-07/msg00000.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://cgit.git.savannah.gnu.org/cgit/inetutils.git","events":[{"introduced":"0"},{"fixed":"e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6"}]},{"type":"GIT","repo":"https://cgit.git.savannah.gnu.org/cgit/inetutils.git","events":[{"introduced":"0"},{"fixed":"e4e65c03f4c11292a3e40ef72ca3f194c8bffdd6"}]}],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.4"}]},{"events":[{"introduced":"0"},{"fixed":"2.5"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40303.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}