摘要:
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
安全等级: Low
公告ID: KylinSec-SA-2021-1517
发布日期: 2021年9月23日
关联CVE: CVE-2019-14287
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
cve名称 | 产品 | 组件 | 是否受影响 |
---|---|---|---|
CVE-2019-14287 | KY3.4-4A | sudo | Unaffected |