[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2019-1315 --- sudo

ID: oval:org.secpod.oval:def:1700229Date: (C)2019-10-15   (M)2023-12-20
Class: PATCHFamily: unix




When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295.This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification. Further details can be found here: https://www.sudo.ws/alerts/minus_1_uid.htmlA flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.

Platform:
Amazon Linux 2
Product:
sudo
Reference:
ALAS2-2019-1315
CVE-2019-14287
CVE-2017-1000367
CVE-2017-1000368
CVE    3
CVE-2017-1000367
CVE-2017-1000368
CVE-2019-14287

© SecPod Technologies