Vulnerability Description
Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sudo Project | Sudo | <= 1.8.20 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/98838Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1574Third Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10205Third Party Advisory
- https://security.gentoo.org/glsa/201710-04Third Party Advisory
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-2/
- https://www.sudo.ws/alerts/linux_tty.htmlVendor Advisory
- http://www.securityfocus.com/bid/98838Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:1574Third Party Advisory
- https://kc.mcafee.com/corporate/index?page=content&id=SB10205Third Party Advisory
- https://security.gentoo.org/glsa/201710-04Third Party Advisory
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-2/
- https://www.sudo.ws/alerts/linux_tty.htmlVendor Advisory
FAQ
What is CVE-2017-1000368?
CVE-2017-1000368 is a vulnerability with a CVSS score of 8.2 (HIGH). Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution...
How severe is CVE-2017-1000368?
CVE-2017-1000368 has been rated HIGH with a CVSS base score of 8.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-1000368?
Check the references section above for vendor advisories and patch information. Affected products include: Sudo Project Sudo.