Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
6.4MEDIUM
EPSS
19.4%
top 4.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 5
Latest updateMay 13

Description

Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.5 | Impact: 5.9

Affected Packages2 packages

Debiansudo< 1.8.20p1-1+3
NVDsudo_project/sudo1.8.20

🔴Vulnerability Details

4
GHSA
GHSA-4c2x-g299-mpv8: Todd Miller's sudo version 12022-05-13
OSV
CVE-2017-1000367: Todd Miller's sudo version 12017-06-05
CVEList
CVE-2017-1000367: Todd Miller's sudo version 12017-06-05
VulnCheck
Sudo Sudo Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')2017

💥Exploits & PoCs

1
Exploit-DB
Sudo 1.8.20 - 'get_process_ttyname()' Local Privilege Escalation2017-06-14

📋Vendor Advisories

4
Red Hat
sudo: Privilege escalation via improper get_process_ttyname() parsing (insufficient fix for CVE-2017-1000367)2017-06-02
Ubuntu
Sudo vulnerability2017-05-30
Red Hat
sudo: Privilege escalation in via improper get_process_ttyname() parsing2017-05-30
Debian
CVE-2017-1000367: sudo - Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validati...2017

💬Community

3
Bugzilla
CVE-2017-1000368 sudo: Privilege escalation via improper get_process_ttyname() parsing (insufficient fix for CVE-2017-1000367)2017-06-06
Bugzilla
CVE-2017-1000367 sudo: sudo: Privilege escalation in via improper get_process_ttyname() parsing [fedora-all]2017-05-30
Bugzilla
CVE-2017-1000367 sudo: Privilege escalation in via improper get_process_ttyname() parsing2017-05-22
CVE-2017-1000367 (MEDIUM CVSS 6.4) | Todd Miller's sudo version 1.8.20 a | cvebase.io