ALT-PU-2020-2731-1
Closed vulnerabilities
BDU:2020-00855
Уязвимость функции stdin getln программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии
BDU:2020-00856
Уязвимость учетной записи sudoer в файле Runas ALL программы системного администрирования Sudo, позволяющая нарушителю отключить аутентификацию пользователя по локальному паролю
BDU:2020-00857
Уязвимость учетной записи sudoer в файле Runas ALL программы системного администрирования Sudo, позволяющая нарушителю выдать себя за несуществующего пользователя
Modified: 2024-11-21
CVE-2019-18634
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
- openSUSE-SU-2020:0244
- openSUSE-SU-2020:0244
- http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html
- http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html
- 20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- 20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- [oss-security] 20200130 CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200130 CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200131 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200131 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- [oss-security] 20200205 Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled
- RHSA-2020:0487
- RHSA-2020:0487
- RHSA-2020:0509
- RHSA-2020:0509
- RHSA-2020:0540
- RHSA-2020:0540
- RHSA-2020:0726
- RHSA-2020:0726
- [debian-lts-announce] 20200201 [SECURITY] [DLA 2094-1] sudo security update
- [debian-lts-announce] 20200201 [SECURITY] [DLA 2094-1] sudo security update
- FEDORA-2020-7c1b270959
- FEDORA-2020-7c1b270959
- FEDORA-2020-8b563bc5f4
- FEDORA-2020-8b563bc5f4
- 20200203 [SECURITY] [DSA 4614-1] sudo security update
- 20200203 [SECURITY] [DSA 4614-1] sudo security update
- 20200203 [slackware-security] sudo (SSA:2020-031-01)
- 20200203 [slackware-security] sudo (SSA:2020-031-01)
- 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra
- GLSA-202003-12
- GLSA-202003-12
- https://security.netapp.com/advisory/ntap-20200210-0001/
- https://security.netapp.com/advisory/ntap-20200210-0001/
- https://support.apple.com/kb/HT210919
- https://support.apple.com/kb/HT210919
- USN-4263-1
- USN-4263-1
- USN-4263-2
- USN-4263-2
- DSA-4614
- DSA-4614
- https://www.sudo.ws/alerts/pwfeedback.html
- https://www.sudo.ws/alerts/pwfeedback.html
- https://www.sudo.ws/security.html
- https://www.sudo.ws/security.html
Modified: 2024-11-21
CVE-2019-18684
Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system calls. The attacker can write "ALL ALL=(ALL) NOPASSWD:ALL" to /proc/#####/fd/3 at a time when Sudo is prompting for a password. NOTE: This has been disputed due to the way Linux /proc works. It has been argued that writing to /proc/#####/fd/3 would only be viable if you had permission to write to /etc/sudoers. Even with write permission to /proc/#####/fd/3, it would not help you write to /etc/sudoers
Modified: 2024-11-21
CVE-2019-19232
In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions
- 20200324 APPLE-SA-2020-03-24-2 macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra
- 20200324 APPLE-SA-2020-03-24-2 macOS Catalina 10.15.4, Security Update 2020-002 Mojave, Security Update 2020-002 High Sierra
- https://access.redhat.com/security/cve/cve-2019-19232
- https://access.redhat.com/security/cve/cve-2019-19232
- FEDORA-2020-7c1b270959
- FEDORA-2020-7c1b270959
- FEDORA-2020-8b563bc5f4
- FEDORA-2020-8b563bc5f4
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58103
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58103
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs76870
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs76870
- https://security.netapp.com/advisory/ntap-20200103-0004/
- https://security.netapp.com/advisory/ntap-20200103-0004/
- https://support.apple.com/en-gb/HT211100
- https://support.apple.com/en-gb/HT211100
- https://support.apple.com/kb/HT211100
- https://support.apple.com/kb/HT211100
- https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19232
- https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19232
- https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5506
- https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5506
- https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html
- https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html
- https://www.oracle.com/security-alerts/bulletinapr2020.html
- https://www.oracle.com/security-alerts/bulletinapr2020.html
- https://www.sudo.ws/devel.html#1.8.30b2
- https://www.sudo.ws/devel.html#1.8.30b2
- https://www.sudo.ws/stable.html
- https://www.sudo.ws/stable.html
- https://www.tenable.com/plugins/nessus/133936
- https://www.tenable.com/plugins/nessus/133936
Modified: 2024-11-21
CVE-2019-19234
In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerberos, etc). Both the Linux shadow(5) and passwd(1) manuals are clear on this. Indeed it is a valid use case to have local accounts that are _only_ accessible via sudo and that cannot be logged into with a password. Sudo 1.8.30 added an optional setting to check the _shell_ of the target user (not the encrypted password!) against the contents of /etc/shells but that is not the same thing as preventing access to users with an invalid password hash
- https://access.redhat.com/security/cve/cve-2019-19234
- https://access.redhat.com/security/cve/cve-2019-19234
- FEDORA-2020-7c1b270959
- FEDORA-2020-7c1b270959
- FEDORA-2020-8b563bc5f4
- FEDORA-2020-8b563bc5f4
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58104
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58104
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58473
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58473
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58772
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58772
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs60748
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs60748
- https://security.netapp.com/advisory/ntap-20200103-0004/
- https://security.netapp.com/advisory/ntap-20200103-0004/
- https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19234
- https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19234
- https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5505
- https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5505
- https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1019-3816
- https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1019-3816
- https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html
- https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html
- https://www.oracle.com/security-alerts/bulletinapr2020.html
- https://www.oracle.com/security-alerts/bulletinapr2020.html
- https://www.sudo.ws/devel.html#1.8.30b2
- https://www.sudo.ws/devel.html#1.8.30b2
- https://www.sudo.ws/stable.html
- https://www.sudo.ws/stable.html
- https://www.suse.com/security/cve/CVE-2019-19234/
- https://www.suse.com/security/cve/CVE-2019-19234/
- https://www.tenable.com/plugins/nessus/132985
- https://www.tenable.com/plugins/nessus/132985