In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Canonical
Subscribe
|
Ubuntu Linux
Subscribe
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Netapp
Subscribe
|
Element Software Management Node
Subscribe
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Desktop
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux Server
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Enterprise Linux Workstation
Subscribe
Openshift
Subscribe
Openshift Container Platform
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Els
Subscribe
Rhel Eus
Subscribe
Rhel Tus
Subscribe
Virtualization
Subscribe
|
|
Sudo Project
Subscribe
|
Sudo
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1964-1 | sudo security update |
Debian DSA |
DSA-4543-1 | sudo security update |
Ubuntu USN |
USN-4154-1 | Sudo vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T00:12:43.383Z
Reserved: 2019-07-27T00:00:00
Link: CVE-2019-14287
No data.
Status : Modified
Published: 2019-10-17T18:15:12.330
Modified: 2024-11-21T04:26:22.577
Link: CVE-2019-14287
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN