Описание
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u #$((0xffffffff))" command.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | released | 1.8.21p2-3ubuntu1.1 |
| devel | released | 1.8.27-1ubuntu4 |
| disco | released | 1.8.27-1ubuntu1.1 |
| esm-infra-legacy/trusty | released | 1.8.9p5-1ubuntu1.5+esm2 |
| esm-infra/bionic | released | 1.8.21p2-3ubuntu1.1 |
| esm-infra/xenial | released | 1.8.16-0ubuntu1.8 |
| precise/esm | not-affected | 1.8.3p1-1ubuntu3.8 |
| trusty | ignored | end of standard support |
| trusty/esm | released | 1.8.9p5-1ubuntu1.5+esm2 |
| upstream | released | 1.8.28 |
Показывать по
EPSS
9 Critical
CVSS2
8.8 High
CVSS3
Связанные уязвимости
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer a ...
EPSS
9 Critical
CVSS2
8.8 High
CVSS3