|Number of vulnerabilities||1|
|Public exploit||Public exploit code for vulnerability #1 is available.|
Client/Desktop applications / Software for system administration
This security bulletin contains one low risk vulnerability.
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists in the implementation of the "sudo" application when processing commands that are configured to run with ALL keyword. A local user with privileges to use sudo for specific applications on the system can escalate privileges and run the application as root (even if precisely restricted), if user id "-1" or "4294967295" is used.
The following entry instructs sudo to allow user bob to run "/usr/bin/id" command as any user on the system but root:
myhost bob = (ALL, !root) /usr/bin/id
The following command will allow bob execute the "/usr/bin/id" command as root:
sudo -u#-1 id -uMitigation
Install updates from vendor's website.Vulnerable software versions
Sudo: 1.8.0 - 1.8.27Fixed software versions
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?