CVE-2017-1000367

Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html Third Party Advisory
http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Jun/3 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3867 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/05/30/16 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/22/5
http://www.openwall.com/lists/oss-security/2022/12/22/6
http://www.securityfocus.com/bid/98745 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038582 Exploit Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3304-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1381 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1382 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/
https://security.gentoo.org/glsa/201705-15 Third Party Advisory
https://www.exploit-db.com/exploits/42183/ Third Party Advisory VDB Entry
https://www.sudo.ws/alerts/linux_tty.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html Third Party Advisory
http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Jun/3 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3867 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/05/30/16 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/22/5
http://www.openwall.com/lists/oss-security/2022/12/22/6
http://www.securityfocus.com/bid/98745 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038582 Exploit Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3304-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1381 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1382 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/
https://security.gentoo.org/glsa/201705-15 Third Party Advisory
https://www.exploit-db.com/exploits/42183/ Third Party Advisory VDB Entry
https://www.sudo.ws/alerts/linux_tty.html Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:04

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html - Third Party Advisory
References () http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2017/Jun/3 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2017/Jun/3 - Mailing List, Third Party Advisory
References () http://www.debian.org/security/2017/dsa-3867 - Third Party Advisory () http://www.debian.org/security/2017/dsa-3867 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2017/05/30/16 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2017/05/30/16 - Exploit, Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2022/12/22/5 - () http://www.openwall.com/lists/oss-security/2022/12/22/5 -
References () http://www.openwall.com/lists/oss-security/2022/12/22/6 - () http://www.openwall.com/lists/oss-security/2022/12/22/6 -
References () http://www.securityfocus.com/bid/98745 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98745 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038582 - Exploit, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1038582 - Exploit, Third Party Advisory, VDB Entry
References () http://www.ubuntu.com/usn/USN-3304-1 - Third Party Advisory () http://www.ubuntu.com/usn/USN-3304-1 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:1381 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1381 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2017:1382 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2017:1382 - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/ -
References () https://security.gentoo.org/glsa/201705-15 - Third Party Advisory () https://security.gentoo.org/glsa/201705-15 - Third Party Advisory
References () https://www.exploit-db.com/exploits/42183/ - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/42183/ - Third Party Advisory, VDB Entry
References () https://www.sudo.ws/alerts/linux_tty.html - Vendor Advisory () https://www.sudo.ws/alerts/linux_tty.html - Vendor Advisory

22 Dec 2022, 22:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/12/22/6 -

22 Dec 2022, 19:15

Type Values Removed Values Added
References
  • (MLIST) http://www.openwall.com/lists/oss-security/2022/12/22/5 -

Information

Published : 2017-06-05 14:29

Updated : 2024-11-21 03:04


NVD link : CVE-2017-1000367

Mitre link : CVE-2017-1000367

CVE.ORG link : CVE-2017-1000367


JSON object : View

Products Affected

sudo_project

  • sudo
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')