Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2017-1000367
Severity
6.4MEDIUM
EPSS
19.4%
top 4.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 5
Latest updateMay 13
Description
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
CVSS vector
CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 0.5 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
4VulnCheck▶
Sudo Sudo Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')↗2017
💥Exploits & PoCs
1📋Vendor Advisories
4💬Community
3Bugzilla▶
CVE-2017-1000368 sudo: Privilege escalation via improper get_process_ttyname() parsing (insufficient fix for CVE-2017-1000367)↗2017-06-06
Bugzilla▶
CVE-2017-1000367 sudo: sudo: Privilege escalation in via improper get_process_ttyname() parsing [fedora-all]↗2017-05-30
Bugzilla▶
CVE-2017-1000367 sudo: Privilege escalation in via improper get_process_ttyname() parsing↗2017-05-22