7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.008 Low
EPSS
Percentile
80.9%
DISPUTED In Sudo through 1.8.29, an attacker with access to a Runas
ALL sudoer account can impersonate a nonexistent user by invoking sudo with
a numeric uid that is not associated with any user. NOTE: The software
maintainer believes that this is not a vulnerability because running a
command via sudo as a user not present in the local password database is an
intentional feature. Because this behavior surprised some users, sudo
1.8.30 introduced an option to enable/disable this behavior with the
default being disabled. However, this does not change the fact that sudo
was behaving as intended, and as documented, in earlier versions.
Author | Note |
---|---|
mdeslaur | upstream sudo has disputed this CVE, sudo works as intended and as documented, so marking this as not-affected. |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.008 Low
EPSS
Percentile
80.9%