First published: Thu Dec 19 2019(Updated: )
** DISPUTED ** In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions.
Credit: cve@mitre.org CVE-2019-19232 cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo Sudo | <=1.8.29 | |
Apple macOS Catalina | <10.15.4 | 10.15.4 |
Apple Mojave | ||
Apple High Sierra | ||
<=1.8.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID for sudo is CVE-2019-19232.
The affected software by CVE-2019-19232 includes macOS Catalina (10.15.4), Mojave, and High Sierra.
CVE-2019-19232 was addressed by updating to sudo version 1.8.31.
You can find more information about CVE-2019-19232 on the Apple support page: https://support.apple.com/en-us/HT211100.