Overview
- Description
- Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 5.2
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- CWE-125
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E76D2160-BE9D-4C9E-B2AB-B52B3C84DAD7", "versionEndExcluding": "1.9.12", "versionStartIncluding": "1.8.0" }, { "criteria": "cpe:2.3:a:sudo_project:sudo:1.9.12:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "30B5DA3F-091D-4627-A5C0-2D1487A378B0" } ], "operator": "OR" } ] } ]