#VU21782 Permissions, Privileges, and Access Controls in Sudo - CVE-2019-14287 

 

#VU21782 Permissions, Privileges, and Access Controls in Sudo - CVE-2019-14287

Published: October 15, 2019 / Updated: February 27, 2024


Vulnerability identifier: #VU21782
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear
CVE-ID: CVE-2019-14287
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability: Public exploit is available
Vulnerable software:
Sudo
Software vendor:
Sudo

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in the implementation of the "sudo" application when processing commands that are configured to run with ALL keyword. A local user with privileges to use sudo for specific applications on the system can escalate privileges and run the application as root (even if precisely restricted), if user id "-1" or "4294967295" is used.

Example:

The following entry instructs sudo to allow user bob to run "/usr/bin/id" command as any user on the system but root:

myhost bob = (ALL, !root) /usr/bin/id

The following command will allow bob execute the  "/usr/bin/id" command as root:

sudo -u#-1 id -u

Remediation

Install updates from vendor's website.

External links