CVE-2019-19234 — Improper Access Control in Sudo
Severity
7.5HIGHNVD
EPSS
4.1%
top 11.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 19
Latest updateMay 24
Description
In Sudo through 1.8.29, the fact that a user has been blocked (e.g., by using the ! character in the shadow file instead of a password hash) is not considered, allowing an attacker (who has access to a Runas ALL sudoer account) to impersonate any blocked user. NOTE: The software maintainer believes that this CVE is not valid. Disabling local password authentication for a user is not the same as disabling all access to that user--the user may still be able to login via other means (ssh key, kerbe…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
🔴Vulnerability Details
3📋Vendor Advisories
2💬Community
2Bugzilla▶
CVE-2019-19234 sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account↗2019-12-27
Bugzilla▶
CVE-2019-19234 sudo: by using ! character in the shadow file instead of a password hash can access to a run as all sudoer account [fedora-all]↗2019-12-27