CCE-95619-3Platform: cpe:/o:ubuntu:ubuntu_linux:18.04, cpe:/o:ubuntu:ubuntu_linux:22.04, cpe:/o:debian:debian_linux:11.x, cpe:/o:ubuntu:ubuntu_linux:20.04, cpe:/o:ubuntu:ubuntu_linux:16.04, cpe:/o:ubuntu:ubuntu_linux:23.04 | Date: (C)2021-03-08 (M)2023-09-01 |
Sudo can be configured to run only from a psuedo-pty.
Rationale:
Attackers can run a malicious program using sudo which would fork a background process that remains even when the main program has finished executing.
Fix:
Edit the file /etc/sudoers or any file in /etc/sudoers.d and add the following : Defaults use_pty
Parameter:
[yes/no]
Technical Mechanism:
edit the file /etc/sudoers or any file in /etc/sudoers.d and add the following : Defaults use_pty
CCSS Severity: | CCSS Metrics: |
CCSS Score : 8.8 | Attack Vector: LOCAL |
Exploit Score: 2.0 | Attack Complexity: LOW |
Impact Score: 6.0 | Privileges Required: LOW |
Severity: HIGH | User Interaction: NONE |
Vector: AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H | Scope: CHANGED |
| Confidentiality: HIGH |
| Integrity: HIGH |
| Availability: HIGH |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:70754 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:87348 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:85198 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:68672 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:92313 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:70665 |