Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2022-43995
HistoryNov 02, 2022 - 2:15 p.m.

CVE-2022-43995

2022-11-0214:15:16
Alpine Linux Development Team
security.alpinelinux.org
17
sudo 1.8.0
1.9.12
crypt() password backend
array-out-of-bounds error
heap-based buffer over-read
arbitrary local users
system libraries
compiler
processor architecture
cve-2022-43995

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

OSVersionArchitecturePackageVersionFilename
Alpine3.14-mainnoarchsudo< 1.9.12-r1UNKNOWN
Alpine3.15-mainnoarchsudo< 1.9.12-r1UNKNOWN

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%