Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2019-14287 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
Sudo Client/Desktop applications / Software for system administration |
Vendor | Sudo |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU21782
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2019-14287
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: Yes
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists in the implementation of the "sudo" application when processing commands that are configured to run with ALL keyword. A local user with privileges to use sudo for specific applications on the system can escalate privileges and run the application as root (even if precisely restricted), if user id "-1" or "4294967295" is used.
Example:
The following entry instructs sudo to allow user bob to run "/usr/bin/id" command as any user on the system but root:
myhost bob = (ALL, !root) /usr/bin/id
The following command will allow bob execute the "/usr/bin/id" command as root:
sudo -u#-1 id -uMitigation
Install updates from vendor's website.
Vulnerable software versionsSudo: 1.8.0 - 1.8.27
CPE2.3 External linkshttp://www.sudo.ws/alerts/minus_1_uid.html
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?