First published: Thu Oct 10 2019(Updated: )
A flaw was found in sudo before version 1.8.28. When sudo is configured to allow a user to run commands as an arbitrary user via the 'ALL' keyword in a 'Runas' specification, it is possible to run commands as root.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sudo | <0:1.7.2p1-31.el5_11.1 | 0:1.7.2p1-31.el5_11.1 |
redhat/sudo | <0:1.8.6p3-29.el6_10.2 | 0:1.8.6p3-29.el6_10.2 |
redhat/sudo | <0:1.8.6p3-12.el6_5.2 | 0:1.8.6p3-12.el6_5.2 |
redhat/sudo | <0:1.8.6p3-15.el6_6.2 | 0:1.8.6p3-15.el6_6.2 |
redhat/sudo | <0:1.8.23-4.el7_7.1 | 0:1.8.23-4.el7_7.1 |
redhat/sudo | <0:1.8.6p7-17.el7_2.2 | 0:1.8.6p7-17.el7_2.2 |
redhat/sudo | <0:1.8.6p7-23.el7_3.2 | 0:1.8.6p7-23.el7_3.2 |
redhat/sudo | <0:1.8.19p2-12.el7_4.1 | 0:1.8.19p2-12.el7_4.1 |
redhat/sudo | <0:1.8.19p2-14.el7_5.1 | 0:1.8.19p2-14.el7_5.1 |
redhat/sudo | <0:1.8.23-3.el7_6.1 | 0:1.8.23-3.el7_6.1 |
redhat/sudo | <0:1.8.25p1-8.el8_1 | 0:1.8.25p1-8.el8_1 |
redhat/sudo | <0:1.8.25p1-4.el8_0.2 | 0:1.8.25p1-4.el8_0.2 |
redhat/redhat-release-virtualization-host | <0:4.2-15.1.el7 | 0:4.2-15.1.el7 |
redhat/redhat-virtualization-host | <0:4.2-20191022.0.el7_6 | 0:4.2-20191022.0.el7_6 |
debian/sudo | <=1.8.27-1<=1.8.19p1-2.1 | 1.8.19p1-2.1+deb9u1 1.8.27-1+deb10u1 1.8.27-1.1 |
redhat/sudo | <1.8.28 | 1.8.28 |
debian/sudo | 1.8.27-1+deb10u3 1.8.27-1+deb10u6 1.9.5p2-3+deb11u1 1.9.13p3-1+deb12u1 1.9.15p5-3 | |
Sudo | <1.8.28 | |
Red Hat Fedora | =29 | |
Red Hat Fedora | =30 | |
Red Hat Fedora | =31 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 | |
SUSE Linux | =15.0 | |
SUSE Linux | =15.1 | |
Ubuntu | =12.04 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 | |
NetApp Element Software | ||
Red Hat OpenShift Container Platform | =4.1 | |
Red Hat Enterprise Virtualization | =4.2 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux Desktop | =6.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server EUS | =8.1 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server | =5.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =6.5 | |
Red Hat Enterprise Linux Server | =6.6 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =7.2 | |
Red Hat Enterprise Linux Server | =7.3 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Workstation | =6.0 | |
Red Hat Enterprise Linux Workstation | =7.0 |
This vulnerability only affects configurations of sudo that have a runas user list that includes an exclusion of root. The most simple example is: ~~~ someuser ALL=(ALL, !root) /usr/bin/somecommand ~~~ The exclusion is specified using an excalamation mark (!). In this example, the "root" user is specified by name. The root user may also be identified in other ways, such as by user id: ~~~ someuser ALL=(ALL, !#0) /usr/bin/somecommand ~~~ or by reference to a runas alias: ~~~ Runas_Alias MYGROUP = root, adminuser someuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand ~~~ To ensure your sudoers configuration is not affected by this vulnerability, we recommend examining each sudoers entry that includes the `!` character in the runas specification, to ensure that the root user is not among the exclusions. These can be found in the /etc/sudoers file or files under /etc/sudoers.d.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID for this flaw in sudo is CVE-2019-14287.
The severity of CVE-2019-14287 is high.
The vulnerability in sudo allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, and can cause incorrect logging.
An attacker can exploit CVE-2019-14287 by invoking sudo with a crafted user ID.
Yes, the fix for this vulnerability in sudo is version 1.8.28.