Lucene search

K
freebsdFreeBSD3310014A-5EF9-11ED-812B-206A8A720317
HistoryNov 07, 2022 - 12:00 a.m.

sudo -- Potential out-of-bounds write for small passwords

2022-11-0700:00:00
vuxml.freebsd.org
12
sudo
version
crypt
password
buffer over-read
local users
system libraries
compiler
processor architecture
vulnerability

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%

SO-AND-SO reports:

Sudo 1.8.0 through 1.9.12, with the crypt() password backend,
contains a plugins/sudoers/auth/passwd.c array-out-of-bounds
error that can result in a heap-based buffer over-read. This
can be triggered by arbitrary local users with access to sudo
by entering a password of seven characters or fewer. The impact
could vary depending on the system libraries, compiler,
and processor architecture.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsudo= 1.8.0UNKNOWN
FreeBSDanynoarchsudo< 1.9.12p1UNKNOWN

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

0.0004 Low

EPSS

Percentile

5.1%