Description
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2094-1 | sudo security update |
Debian DSA |
DSA-4614-1 | sudo security update |
Ubuntu USN |
USN-4263-1 | Sudo vulnerability |
Ubuntu USN |
USN-4263-2 | Sudo vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T01:54:14.581Z
Reserved: 2019-10-30T00:00:00.000Z
Link: CVE-2019-18634
No data.
Status : Modified
Published: 2020-01-29T18:15:12.247
Modified: 2024-11-21T04:33:25.447
Link: CVE-2019-18634
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN