Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-14287
HistoryOct 14, 2019 - 12:00 a.m.

CVE-2019-14287

2019-10-1400:00:00
ubuntu.com
ubuntu.com
12

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.308 Low

EPSS

Percentile

96.9%

In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer
account can bypass certain policy blacklists and session PAM modules, and
can cause incorrect logging, by invoking sudo with a crafted user ID. For
example, this allows bypass of !root configuration, and USER= logging, for
a “sudo -u #$((0xffffffff))” command.

Bugs

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchsudo< 1.8.21p2-3ubuntu1.1UNKNOWN
ubuntu19.04noarchsudo< 1.8.27-1ubuntu1.1UNKNOWN
ubuntu14.04noarchsudo< 1.8.9p5-1ubuntu1.5+esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchsudo< 1.8.16-0ubuntu1.8UNKNOWN

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.308 Low

EPSS

Percentile

96.9%