Lucene search

K
f5F5F5:K91327225
HistoryFeb 24, 2020 - 12:00 a.m.

K91327225 : Linux sudo process vulnerability CVE-2019-18634

2020-02-2400:00:00
my.f5.com
24

7.9 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

55.8%

Security Advisory Description

In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c. (CVE-2019-18634)

Impact

An attacker can trigger a stack-based buffer overflow in the privileged sudo process.