PatchSiren cyber security CVE debrief
CVE-2016-6252 Shadow Project CVE debrief
CVE-2016-6252 is a local privilege-escalation issue in shadow 4.2.1 caused by an integer overflow (CWE-190) when processing crafted input to newuidmap. NVD rates the issue HIGH with a CVSS 3.0 score of 7.8. Administrators should confirm whether affected shadow packages are installed and apply the vendor or distribution fix.
- Vendor
- Shadow Project
- Product
- CVE-2016-6252
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-17
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-17
- Advisory updated
- 2026-05-13
Who should care
Linux system administrators, security teams, and distribution maintainers responsible for shadow packages or systems that use newuidmap. Environments running shadow 4.2.1 should treat this as a priority patching item because local users may be able to escalate privileges.
Technical summary
The NVD record identifies shadow 4.2.1 as vulnerable and describes an integer overflow in newuidmap triggered by crafted input. The result is a local privilege-escalation path for an attacker with local access and low privileges. NVD maps the issue to CVSS 3.0 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H and CWE-190.
Defensive priority
High. This is a local attack that can lead to full compromise of confidentiality, integrity, and availability on the affected host once an attacker has local access.
Recommended defensive actions
- Verify whether any systems run shadow 4.2.1 or vendor builds derived from that release.
- Apply the distribution or vendor update referenced by the applicable advisory, such as Debian DSA-3793.
- Review package management and configuration records to confirm the fixed shadow package is deployed.
- Restrict untrusted local access where practical until remediation is complete.
- Monitor privileged account activity and changes on hosts that may have been exposed before patching.
Evidence notes
This debrief is based on the supplied NVD CVE record and its listed references. The record describes 'Integer overflow in shadow 4.2.1' and links the issue to crafted input passed to newuidmap. It also provides the CVSS 3.0 vector AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, the primary weakness CWE-190, and remediation references from Debian, openwall oss-security, SUSE Bugzilla, the shadow-maint GitHub issue, SecurityFocus, and Gentoo.
Official resources
-
CVE-2016-6252 CVE record
CVE.org
-
CVE-2016-6252 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Issue Tracking, Patch
CVE published by NVD/CVE on 2017-02-17; the supplied NVD record was last modified on 2026-05-13. Public advisories and issue trackers cited by NVD were part of the disclosure trail.