Lucene search

K
amazonAmazonALAS-2023-1682
HistoryJan 31, 2023 - 8:44 p.m.

Important: sudo

2023-01-3120:44:00
alas.aws.amazon.com
33
sudo vulnerability
privilege escalation
cve-2023-22809
sudoedit
extra arguments
environment variables

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

19.7%

Issue Overview:

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=‘vim – /path/to/extra/file’ value. (CVE-2023-22809)

Affected Packages:

sudo

Issue Correction:
Run yum update sudo to update your system.

New Packages:

i686:  
    sudo-1.8.23-10.57.amzn1.i686  
    sudo-devel-1.8.23-10.57.amzn1.i686  
    sudo-debuginfo-1.8.23-10.57.amzn1.i686  
  
src:  
    sudo-1.8.23-10.57.amzn1.src  
  
x86_64:  
    sudo-debuginfo-1.8.23-10.57.amzn1.x86_64  
    sudo-devel-1.8.23-10.57.amzn1.x86_64  
    sudo-1.8.23-10.57.amzn1.x86_64  

Additional References

Red Hat: CVE-2023-22809

Mitre: CVE-2023-22809

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

19.7%