Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-19232

Опубликовано: 19 дек. 2019
Источник: ubuntu
Приоритет: low
CVSS2: 5
CVSS3: 7.5

Описание

In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions

РелизСтатусПримечание
bionic

not-affected

devel

released

1.8.31-1ubuntu1
disco

ignored

end of life
eoan

not-affected

esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

released

1.8.31-1ubuntu1
esm-infra/xenial

not-affected

focal

released

1.8.31-1ubuntu1
precise/esm

not-affected

Показывать по

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 6 лет назад

In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions

CVSS3: 7.5
nvd
около 6 лет назад

In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions

CVSS3: 7.5
debian
около 6 лет назад

In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer ...

CVSS3: 7.5
github
больше 3 лет назад

In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user.

oracle-oval
почти 6 лет назад

ELSA-2020-1804: sudo security, bug fix, and enhancement update (MODERATE)

5 Medium

CVSS2

7.5 High

CVSS3