Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-42465
HistoryDec 22, 2023 - 12:00 a.m.

CVE-2023-42465

2023-12-2200:00:00
ubuntu.com
ubuntu.com
19
sudo vulnerability
row hammer attacks
authentication bypass

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

3.5 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

19.0%

Sudo before 1.9.15 might allow row hammer attacks (for authentication
bypass or privilege escalation) because application logic sometimes is
based on not equaling an error value (instead of equaling a success value),
and because the values do not resist flips of a single bit.

Notes

Author Note
rodrigo-zaiden part of the code in the fix commit, in plugins/sudoers/auth/passwd.c, plugins/sudoers/auth/sudo_auth.c and plugins/sudoers/auth/sudo_auth.h is not built with Ubuntu as it is using PAM support. for the other part, the code fixed in plugins/sudoers/lookup.c was added in version 1.9.15. hence not affecting any Ubuntu releases, and for plugins/sudoers/match.c, part was added in 1.8.21, that if considered just by itself, it doesn’t worth patching.

7 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

3.5 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:S/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

19.0%