vendor:
sudo
by:
Qualys, Inc.
6.4
CVSS
MEDIUM
Privilege Escalation
119
CWE
Product Name: sudo
Affected Version From: All versions of sudo prior to 1.8.20p1
Affected Version To: 1.8.20p1
Patch Exists: YES
Related CWE: CVE-2017-1000367
CPE: a:sudo:sudo:1.8.20p1
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp1-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2017-1000367/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2017-1000367/
Platforms Tested: Linux
2017
Linux_sudo_CVE-2017-1000367
This exploit allows an attacker with physical access to a system to gain root privileges by exploiting a vulnerability in the sudo program. By creating a large number of pseudo-terminals (pts), the attacker can overflow a buffer in the sudo program and execute arbitrary code with root privileges. The vulnerability was reported by Qualys, Inc. and assigned CVE-2017-1000367.
Mitigation:
The vulnerability has been patched in sudo versions 1.8.20p1 and later. Users are advised to update their sudo installations to the latest version to mitigate the risk of exploitation.