8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.308 Low
EPSS
Percentile
96.9%
Issue Overview:
When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295.
This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification. (CVE-2019-14287)
Further details can be found here: https://www.sudo.ws/alerts/minus_1_uid.html
Affected Packages:
sudo
Issue Correction:
Run yum update sudo to update your system.
New Packages:
i686:
sudo-debuginfo-1.8.6p3-29.28.amzn1.i686
sudo-devel-1.8.6p3-29.28.amzn1.i686
sudo-1.8.6p3-29.28.amzn1.i686
src:
sudo-1.8.6p3-29.28.amzn1.src
x86_64:
sudo-devel-1.8.6p3-29.28.amzn1.x86_64
sudo-debuginfo-1.8.6p3-29.28.amzn1.x86_64
sudo-1.8.6p3-29.28.amzn1.x86_64
Red Hat: CVE-2019-14287
Mitre: CVE-2019-14287
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | sudo-debuginfo | < 1.8.6p3-29.28.amzn1 | sudo-debuginfo-1.8.6p3-29.28.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | sudo-devel | < 1.8.6p3-29.28.amzn1 | sudo-devel-1.8.6p3-29.28.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | sudo | < 1.8.6p3-29.28.amzn1 | sudo-1.8.6p3-29.28.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | sudo-devel | < 1.8.6p3-29.28.amzn1 | sudo-devel-1.8.6p3-29.28.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | sudo-debuginfo | < 1.8.6p3-29.28.amzn1 | sudo-debuginfo-1.8.6p3-29.28.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | sudo | < 1.8.6p3-29.28.amzn1 | sudo-1.8.6p3-29.28.amzn1.x86_64.rpm |
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:S/C:C/I:C/A:C
0.308 Low
EPSS
Percentile
96.9%