CVE-2017-1000368

Impact:
Moderate
Public Date:
2017-06-02
CWE:
CWE-20
Bugzilla:
1459152: CVE-2017-1000368 sudo: Privilege escalation via improper get_process_ttyname() parsing (insufficient fix for CVE-2017-1000367)
It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.

Find out more about CVE-2017-1000368 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

CVSS3 Base Score 7.3
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required Low
User Interaction Required
Scope Unchanged
Confidentiality High
Integrity Impact High
Availability Impact High

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Server (v. 5 ELS) (sudo) RHSA-2017:1574 2017-06-22
Red Hat Enterprise Linux 7 (sudo) RHSA-2017:1574 2017-06-22
Red Hat Enterprise Linux 6 (sudo) RHSA-2017:1574 2017-06-22

External References

Last Modified
Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.