In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions
References
Configurations
History
21 Nov 2024, 04:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2020/Mar/31 - | |
References | () https://access.redhat.com/security/cve/cve-2019-19232 - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6TKF36KOQUVJNBHSVJFA7BU3CCEYD2F/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY6DZ7WMDKU4ZDML6MJLDAPG42B5WVUC/ - | |
References | () https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58103 - | |
References | () https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58812 - | |
References | () https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs58979 - | |
References | () https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs76870 - | |
References | () https://security.netapp.com/advisory/ntap-20200103-0004/ - | |
References | () https://support.apple.com/en-gb/HT211100 - | |
References | () https://support.apple.com/kb/HT211100 - | |
References | () https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-19232 - | |
References | () https://support2.windriver.com/index.php?page=defects&on=view&id=LIN1018-5506 - | |
References | () https://www.bsi.bund.de/SharedDocs/Warnmeldungen/DE/CB/2019/12/warnmeldung_cb-k20-0001.html - | |
References | () https://www.oracle.com/security-alerts/bulletinapr2020.html - | |
References | () https://www.sudo.ws/devel.html#1.8.30b2 - Vendor Advisory | |
References | () https://www.sudo.ws/stable.html - Vendor Advisory | |
References | () https://www.tenable.com/plugins/nessus/133936 - |
07 Nov 2023, 03:07
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | In Sudo through 1.8.29, an attacker with access to a Runas ALL sudoer account can impersonate a nonexistent user by invoking sudo with a numeric uid that is not associated with any user. NOTE: The software maintainer believes that this is not a vulnerability because running a command via sudo as a user not present in the local password database is an intentional feature. Because this behavior surprised some users, sudo 1.8.30 introduced an option to enable/disable this behavior with the default being disabled. However, this does not change the fact that sudo was behaving as intended, and as documented, in earlier versions |
Information
Published : 2019-12-19 21:15
Updated : 2024-11-21 04:34
NVD link : CVE-2019-19232
Mitre link : CVE-2019-19232
CVE.ORG link : CVE-2019-19232
JSON object : View
Products Affected
sudo
- sudo
CWE