Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-46959 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 05 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-05-05T13:45:19.142Z

Reserved: 2022-10-28T00:00:00.000Z

Link: CVE-2022-43995

cve-icon Vulnrichment

Updated: 2024-08-03T13:47:04.589Z

cve-icon NVD

Status : Modified

Published: 2022-11-02T14:15:16.187

Modified: 2025-05-05T14:15:27.907

Link: CVE-2022-43995

cve-icon Redhat

Severity : Important

Publid Date: 2022-11-02T00:00:00Z

Links: CVE-2022-43995 - Bugzilla

cve-icon OpenCVE Enrichment

No data.