CVE-2017-1000368
sudo: Privilege escalation via improper get_process_ttyname() parsing (insufficient fix for CVE-2017-1000367)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
La versión 1.8.20p1 y anteriores de sudo de Todd Miller es vulnerable a una validación de entradas (nuevas líneas embebidas) en la función get_process_ttyname() que da lugar a una revelación de información y la ejecución de comandos.
It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-06-02 CVE Reserved
- 2017-06-05 CVE Published
- 2024-08-05 CVE Updated
- 2025-04-28 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/98838 | Third Party Advisory | |
https://kc.mcafee.com/corporate/index?page=content&id=SB10205 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2017:1574 | 2019-05-29 | |
https://security.gentoo.org/glsa/201710-04 | 2019-05-29 | |
https://usn.ubuntu.com/3968-1 | 2019-05-29 | |
https://usn.ubuntu.com/3968-2 | 2019-05-29 | |
https://www.sudo.ws/alerts/linux_tty.html | 2019-05-29 | |
https://access.redhat.com/security/cve/CVE-2017-1000368 | 2017-06-22 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1459152 | 2017-06-22 | |
https://access.redhat.com/security/cve/CVE-2017-1000367 | 2017-06-22 | |
https://access.redhat.com/security/vulnerabilities/3059071 | 2017-06-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sudo Project Search vendor "Sudo Project" | Sudo Search vendor "Sudo Project" for product "Sudo" | <= 1.8.20 Search vendor "Sudo Project" for product "Sudo" and version " <= 1.8.20" | - |
Affected
| ||||||
Sudo Project Search vendor "Sudo Project" | Sudo Search vendor "Sudo Project" for product "Sudo" | 1.8.20 Search vendor "Sudo Project" for product "Sudo" and version "1.8.20" | p1 |
Affected
|