Lucene search

K
amazonAmazonALAS2-2019-1315
HistoryOct 11, 2019 - 10:07 p.m.

Important: sudo

2019-10-1122:07:00
alas.aws.amazon.com
16

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.308 Low

EPSS

Percentile

96.9%

Issue Overview:

When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295.

This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification. (CVE-2019-14287)

Further details can be found here: https://www.sudo.ws/alerts/minus_1_uid.html

A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.(CVE-2017-1000367)

It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.(CVE-2017-1000368)

Affected Packages:

sudo

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update sudo to update your system.

New Packages:

aarch64:  
    sudo-1.8.23-4.amzn2.0.1.aarch64  
    sudo-devel-1.8.23-4.amzn2.0.1.aarch64  
    sudo-debuginfo-1.8.23-4.amzn2.0.1.aarch64  
  
i686:  
    sudo-1.8.23-4.amzn2.0.1.i686  
    sudo-devel-1.8.23-4.amzn2.0.1.i686  
    sudo-debuginfo-1.8.23-4.amzn2.0.1.i686  
  
src:  
    sudo-1.8.23-4.amzn2.0.1.src  
  
x86_64:  
    sudo-1.8.23-4.amzn2.0.1.x86_64  
    sudo-devel-1.8.23-4.amzn2.0.1.x86_64  
    sudo-debuginfo-1.8.23-4.amzn2.0.1.x86_64  

Additional References

Red Hat: CVE-2017-1000367, CVE-2017-1000368, CVE-2019-14287

Mitre: CVE-2017-1000367, CVE-2017-1000368, CVE-2019-14287

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.308 Low

EPSS

Percentile

96.9%