CVE-2017-1000367

Impact:
Important
Public Date:
2017-05-30
Bugzilla:
1453074: CVE-2017-1000367 sudo: Privilege escalation in via improper get_process_ttyname() parsing
A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.

Find out more about CVE-2017-1000367 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.8
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 6 (sudo) RHSA-2017:1382 2017-05-30
Red Hat Enterprise Linux Server (v. 5 ELS) (sudo) RHSA-2017:1381 2017-05-30
Red Hat Enterprise Linux 7 (sudo) RHSA-2017:1382 2017-05-30

Acknowledgements

Red Hat would like to thank Qualys Security for reporting this issue.

Mitigation

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.