CVE-2022-43995

CWE-125Out-of-bounds Read7 documents7 sources
Severity
7.1HIGH
EPSS
0.1%
top 73.71%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 2
Latest updateNov 8

Description

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:HExploitability: 1.8 | Impact: 5.2

Affected Packages2 packages

NVDsudo_project/sudo1.8.01.9.12+1
Debiansudo< 1.9.12p1-1+2

Patches

🔴Vulnerability Details

3
GHSA
GHSA-3r97-xp9v-83jf: Sudo 12022-11-02
CVEList
CVE-2022-43995: Sudo 12022-11-02
OSV
CVE-2022-43995: Sudo 12022-11-02

📋Vendor Advisories

3
Microsoft
Sudo 1.8.0 through 1.9.12 with the crypt() password backend contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered b2022-11-08
Red Hat
sudo: heap-based overflow with very small passwords2022-11-02
Debian
CVE-2022-43995: sudo - Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins...2022
CVE-2022-43995 (HIGH CVSS 7.1) | Sudo 1.8.0 through 1.9.12 | cvebase.io