PT-2019-4663 · Todd Miller +4 · Sudo +4

Published

2019-12-19

·

Updated

2024-08-05

·

CVE-2019-19234

CVSS v2.0
7.8
VectorAV:N/AC:L/Au:N/C:N/I:C/A:N

Name of the Vulnerable Software and Affected Versions:

Sudo versions 1.8.29 and earlier

Description:

The issue is related to improper access control in Sudo, allowing an attacker with access to a Runas ALL sudoer account to impersonate any blocked user. This is because the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered. The software maintainer believes that this issue is not valid, as disabling local password authentication for a user is not the same as disabling all access to that user. Users may still be able to login via other means, such as ssh key or kerberos.

Recommendations:

For Sudo versions 1.8.29 and earlier, consider updating to Sudo 1.8.30 or later, which adds an optional setting to check the shell of the target user against the contents of /etc/shells. As a temporary workaround, consider restricting access to blocked users or disabling the use of the Runas ALL sudoer account until a patch is available.

Exploit

Fix

Improper Access Control

Weakness Enumeration

Related Identifiers

ALT-PU-2020-2707
ALT-PU-2020-2731
ALT-PU-2021-1164
ALT-PU-2021-1174
ALT-PU-2021-1184
BDU:2020-00856
CESA-2020_1804
CVE-2019-19234
MGASA-2020-0246
RHSA-2020:1804
RHSA-2020_1804

Affected Products

Alt Linux
Astra Linux
Centos
Red Hat
Sudo