发布时间: 2023年2月3日
修改时间: 2024年10月31日
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a -- argument that defeats a protection mechanism, e.g., an EDITOR= vim -- /path/to/extra/file value.
NVD | openEuler | |
---|---|---|
Confidentiality | High | High |
Attack Vector | Local | Local |
CVSS评分 | 7.8 | 7.8 |
Attack Complexity | Low | Low |
Privileges Required | Low | Low |
Scope | Unchanged | Unchanged |
Integrity | High | High |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1044 | sudo security update | 2023年2月3日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | sudo | Fixed |
KY3.4-5 | sudo | Fixed |
KY3.5.1 | sudo | Fixed |
KY3.5.2 | sudo | Fixed |