Логотип exploitDog
bind:CVE-2019-18634
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-18634

Количество 15

Количество 15

ubuntu логотип

CVE-2019-18634

около 6 лет назад

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

CVSS3: 7.8
EPSS: Высокий
redhat логотип

CVE-2019-18634

около 6 лет назад

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

CVSS3: 7.8
EPSS: Высокий
nvd логотип

CVE-2019-18634

около 6 лет назад

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

CVSS3: 7.8
EPSS: Высокий
debian логотип

CVE-2019-18634

около 6 лет назад

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users ...

CVSS3: 7.8
EPSS: Высокий
suse-cvrf логотип

openSUSE-SU-2020:0244-1

почти 6 лет назад

Security update for sudo

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2020:0409-1

почти 6 лет назад

Security update for sudo

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2020:0408-1

почти 6 лет назад

Security update for sudo

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2020:0407-1

почти 6 лет назад

Security update for sudo

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2020:0406-1

почти 6 лет назад

Security update for sudo

EPSS: Высокий
suse-cvrf логотип

SUSE-SU-2020:0390-1

почти 6 лет назад

Security update for sudo

EPSS: Высокий
github логотип

GHSA-rjv5-9w4p-4jrw

больше 3 лет назад

In Sudo through 1.8.29, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

EPSS: Высокий
oracle-oval логотип

ELSA-2020-0726

почти 6 лет назад

ELSA-2020-0726: sudo security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0540

почти 6 лет назад

ELSA-2020-0540: sudo security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0487

почти 6 лет назад

ELSA-2020-0487: sudo security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2020-00855

около 6 лет назад

Уязвимость функции stdin getln программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-18634

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

CVSS3: 7.8
87%
Высокий
около 6 лет назад
redhat логотип
CVE-2019-18634

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

CVSS3: 7.8
87%
Высокий
около 6 лет назад
nvd логотип
CVE-2019-18634

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

CVSS3: 7.8
87%
Высокий
около 6 лет назад
debian логотип
CVE-2019-18634

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users ...

CVSS3: 7.8
87%
Высокий
около 6 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0244-1

Security update for sudo

87%
Высокий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0409-1

Security update for sudo

87%
Высокий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0408-1

Security update for sudo

87%
Высокий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0407-1

Security update for sudo

87%
Высокий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0406-1

Security update for sudo

87%
Высокий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2020:0390-1

Security update for sudo

87%
Высокий
почти 6 лет назад
github логотип
GHSA-rjv5-9w4p-4jrw

In Sudo through 1.8.29, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.

87%
Высокий
больше 3 лет назад
oracle-oval логотип
ELSA-2020-0726

ELSA-2020-0726: sudo security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2020-0540

ELSA-2020-0540: sudo security update (IMPORTANT)

почти 6 лет назад
oracle-oval логотип
ELSA-2020-0487

ELSA-2020-0487: sudo security update (IMPORTANT)

почти 6 лет назад
fstec логотип
BDU:2020-00855

Уязвимость функции stdin getln программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.8
87%
Высокий
около 6 лет назад

Уязвимостей на страницу