Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-7090

Опубликовано: 15 авг. 2019
Источник: redhat
CVSS3: 6.6
EPSS Низкий

Описание

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

Отчет

This vulnerability was introduced in sudo 1.8.24 which affects IPA-sudo integration as used in FreeIPA, where sudoers parsing was unified. This issue was fixed in sudo-1.8.25p1-7.el8.x86_64 by RHBA-2019:3598. Red Hat ships fixed versions of sudo. Hence, Red Hat Enterprise Linux is not affected by this CVE. https://access.redhat.com/errata/RHBA-2019:3598

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6sudoNot affected
Red Hat Enterprise Linux 7sudoNot affected
Red Hat Enterprise Linux 8sudoNot affected
Red Hat Enterprise Linux 9sudoNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-269
https://bugzilla.redhat.com/show_bug.cgi?id=2255723sudo: Improper handling of ipa_hostname leads to privilege mismanagement

EPSS

Процентиль: 15%
0.00049
Низкий

6.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.6
ubuntu
больше 1 года назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

CVSS3: 6.6
nvd
больше 1 года назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

CVSS3: 6.6
debian
больше 1 года назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_ho ...

CVSS3: 8.8
redos
больше 1 года назад

Уязвимость в sudo

CVSS3: 6.6
github
больше 1 года назад

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.

EPSS

Процентиль: 15%
0.00049
Низкий

6.6 Medium

CVSS3