CVE-2017-1000367

Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html Third Party Advisory
http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Jun/3 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3867 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/05/30/16 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/22/5
http://www.openwall.com/lists/oss-security/2022/12/22/6
http://www.securityfocus.com/bid/98745 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038582 Exploit Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3304-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1381 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1382 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/
https://security.gentoo.org/glsa/201705-15 Third Party Advisory
https://www.exploit-db.com/exploits/42183/ Third Party Advisory VDB Entry
https://www.sudo.ws/alerts/linux_tty.html Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html Third Party Advisory
http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Jun/3 Mailing List Third Party Advisory
http://www.debian.org/security/2017/dsa-3867 Third Party Advisory
http://www.openwall.com/lists/oss-security/2017/05/30/16 Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2022/12/22/5
http://www.openwall.com/lists/oss-security/2022/12/22/6
http://www.securityfocus.com/bid/98745 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1038582 Exploit Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-3304-1 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1381 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1382 Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/
https://security.gentoo.org/glsa/201705-15 Third Party Advisory
https://www.exploit-db.com/exploits/42183/ Third Party Advisory VDB Entry
https://www.sudo.ws/alerts/linux_tty.html Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-06-05 14:29

Updated : 2025-04-20 01:37


NVD link : CVE-2017-1000367

Mitre link : CVE-2017-1000367

CVE.ORG link : CVE-2017-1000367


JSON object : View

Products Affected

sudo_project

  • sudo
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')