Lucene search

K
rosalinuxROSA LABROSA-SA-2023-2075
HistoryJan 31, 2023 - 12:50 p.m.

Advisory ROSA-SA-2023-2075

2023-01-3112:50:07
ROSA LAB
abf.rosalinux.ru
14
sudo 1.8.23
privilege escalation
environment variables

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

19.7%

Software: sudo 1.8.23
OS: rosa-server79

package_evr_string: sudo-1.8.23-11

CVE-ID: CVE-2023-22809
BDU-ID: 2023-00210
CVE-Crit: HIGH
CVE-DESC: A vulnerability in the sudoedit function of the Sudo system administration program is related to errors in the handling of additional arguments in environment variables. Exploitation of the vulnerability could allow an attacker acting remotely to escalate their privileges
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a “–” argument that defeats a protection mechanism, e.g., an EDITOR=‘vim – /path/to/extra/file’ value.
CVE-STATUS: Fixed
CVE-REC: Run yum update sudo command to close it

OSVersionArchitecturePackageVersionFilename
rosaanynoarchsudo< 1.8.23UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

19.7%