#VU21782 Permissions, Privileges, and Access Controls in Sudo - CVE-2019-14287
Published: October 15, 2019 / Updated: February 27, 2024
Vulnerability identifier: #VU21782
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2019-14287
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
Public exploit is available
Vulnerable software:
Sudo
Sudo
Software vendor:
Sudo
Sudo
Description
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists in the implementation of the "sudo" application when processing commands that are configured to run with ALL keyword. A local user with privileges to use sudo for specific applications on the system can escalate privileges and run the application as root (even if precisely restricted), if user id "-1" or "4294967295" is used.
Example:
The following entry instructs sudo to allow user bob to run "/usr/bin/id" command as any user on the system but root:
myhost bob = (ALL, !root) /usr/bin/id
The following command will allow bob execute the "/usr/bin/id" command as root:
sudo -u#-1 id -u
Remediation
Install updates from vendor's website.