First published: Mon Feb 03 2020(Updated: )
Joe Vennix discovered that Sudo incorrectly handled memory operations when the pwfeedback option is enabled. A local attacker could possibly use this issue to obtain unintended access to the administrator account.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/sudo | <1.8.27-1ubuntu4.1 | 1.8.27-1ubuntu4.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/sudo-ldap | <1.8.27-1ubuntu4.1 | 1.8.27-1ubuntu4.1 |
Ubuntu Linux | =19.10 | |
All of | ||
ubuntu/sudo | <1.8.21p2-3ubuntu1.2 | 1.8.21p2-3ubuntu1.2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/sudo-ldap | <1.8.21p2-3ubuntu1.2 | 1.8.21p2-3ubuntu1.2 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/sudo | <1.8.16-0ubuntu1.9 | 1.8.16-0ubuntu1.9 |
Ubuntu Linux | =16.04 | |
All of | ||
ubuntu/sudo-ldap | <1.8.16-0ubuntu1.9 | 1.8.16-0ubuntu1.9 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-4263-1 is critical due to potential unauthorized access to administrator accounts.
To fix USN-4263-1, upgrade the sudo or sudo-ldap package to the recommended version for your Ubuntu release.
USN-4263-1 affects Ubuntu 19.10, 18.04, and 16.04 with specific vulnerable versions of sudo and sudo-ldap.
The CVE associated with USN-4263-1 is CVE-2019-18634.
The vulnerability leading to USN-4263-1 was discovered by Joe Vennix.