First published: Tue Jan 28 2020(Updated: )
Apple macOS Catalina is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the privileged sudo process. By sending an overly long string to the stdin of getln() in tgetpass.c., a local attacker could overflow a buffer and execute arbitrary code on the system.
Credit: cve@mitre.org Apple cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo Project Sudo | >=1.7.1<1.8.26 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
debian/sudo | <=1.8.19p1-2.1<=1.8.29-1<=1.8.27-1<=1.8.27-1+deb10u1<=1.8.19p1-2.1+deb9u1 | 1.8.31-1 1.8.27-1+deb10u2 1.8.19p1-2.1+deb9u2 |
Apple macOS Catalina | <10.15.3 | 10.15.3 |
Apple Mojave | ||
Apple High Sierra | ||
redhat/sudo | <1.8.31 | 1.8.31 |
IBM Data Risk Manager | <=2.0.6 | |
debian/sudo | 1.9.5p2-3+deb11u1 1.9.13p3-1+deb12u1 1.9.15p5-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2019-18634 is a vulnerability in sudo that allows for a buffer overflow attack due to memory handling issues.
CVE-2019-18634 affects macOS Catalina (up to version 10.15.3), Mojave, and High Sierra.
To fix CVE-2019-18634, update your Apple macOS to version 10.15.3 or install the latest security updates for Mojave or High Sierra.
The severity of CVE-2019-18634 is not specified in the description.
More information about CVE-2019-18634 can be found at the following reference: [https://support.apple.com/en-us/HT210919](https://support.apple.com/en-us/HT210919)