Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
References
Configurations
History
21 Nov 2024, 03:04
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html - Third Party Advisory | |
References | () http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2017/Jun/3 - Mailing List, Third Party Advisory | |
References | () http://www.debian.org/security/2017/dsa-3867 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2017/05/30/16 - Exploit, Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2022/12/22/5 - | |
References | () http://www.openwall.com/lists/oss-security/2022/12/22/6 - | |
References | () http://www.securityfocus.com/bid/98745 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1038582 - Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/USN-3304-1 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:1381 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2017:1382 - Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/ - | |
References | () https://security.gentoo.org/glsa/201705-15 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/42183/ - Third Party Advisory, VDB Entry | |
References | () https://www.sudo.ws/alerts/linux_tty.html - Vendor Advisory |
22 Dec 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Dec 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2017-06-05 14:29
Updated : 2024-11-21 03:04
NVD link : CVE-2017-1000367
Mitre link : CVE-2017-1000367
CVE.ORG link : CVE-2017-1000367
JSON object : View
Products Affected
sudo_project
- sudo
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')