9

CVE-2019-14287

Exploit

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Sudo ProjectSudo Version < 1.8.28
FedoraprojectFedora Version29
FedoraprojectFedora Version30
FedoraprojectFedora Version31
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
DebianDebian Linux Version10.0
OpensuseLeap Version15.0
OpensuseLeap Version15.1
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
RedhatVirtualization Version4.2
RedhatEnterprise Linux Version8.0
RedhatEnterprise Linux Eus Version7.5
RedhatEnterprise Linux Eus Version7.6
RedhatEnterprise Linux Eus Version7.7
RedhatEnterprise Linux Eus Version8.1
RedhatEnterprise Linux Eus Version8.2
RedhatEnterprise Linux Eus Version8.4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 86.13% 0.994
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 9 8 10
AV:N/AC:L/Au:S/C:C/I:C/A:C
CWE-755 Improper Handling of Exceptional Conditions

The product does not handle or incorrectly handles an exceptional condition.

http://www.openwall.com/lists/oss-security/2019/10/14/1
Third Party Advisory
Exploit
Mailing List
https://seclists.org/bugtraq/2019/Oct/20
Third Party Advisory
Mailing List
Issue Tracking
https://seclists.org/bugtraq/2019/Oct/21
Third Party Advisory
Mailing List
Issue Tracking
https://usn.ubuntu.com/4154-1/
Third Party Advisory
https://www.openwall.com/lists/oss-security/2019/10/15/2
Patch
Third Party Advisory
Mailing List