Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-7090

Опубликовано: 15 авг. 2019
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

Отчет

This vulnerability was introduced in sudo 1.8.24 which affects IPA-sudo integration as used in FreeIPA, where sudoers parsing was unified. This issue was fixed in sudo-1.8.25p1-7.el8.x86_64 by RHBA-2019:3598. Red Hat ships fixed versions of sudo. Hence, Red Hat Enterprise Linux is not affected by this CVE. https://access.redhat.com/errata/RHBA-2019:3598

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sudoNot affected
Red Hat Enterprise Linux 7sudoNot affected
Red Hat Enterprise Linux 8sudoNot affected
Red Hat Enterprise Linux 9sudoNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-269
https://bugzilla.redhat.com/show_bug.cgi?id=2255723sudo: Improper handling of ipa_hostname leads to privilege mismanagement

EPSS

Процентиль: 24%
0.00082
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.6
ubuntu
около 2 лет назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

CVSS3: 6.6
nvd
около 2 лет назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

CVSS3: 6.6
debian
около 2 лет назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_ho ...

CVSS3: 6.6
github
около 2 лет назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

CVSS3: 8.8
fstec
около 2 лет назад

Уязвимость программы для системного администрирования sudo, связанная с неправильным управлением привилегиями, позволяющая нарушителю обойти существующие ограничения безопасности и сохранить свои привилегии после их отзыва

EPSS

Процентиль: 24%
0.00082
Низкий

6.6 Medium

CVSS3