Description
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:LExploitability: 2.3 | Impact: 3.7Attack Vector: Network
Complexity: Low
Privileges: High
User Interaction: None
Scope: Changed
Confidentiality: Low
Integrity: Low
Availability: Low
Affected Packages2 packages
▶Debiansudo< 1.8.28p1-1+3 🔴Vulnerability Details
3GHSAGHSA-8mrc-5phh-m9pc: A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd↗2023-12-24 ▶ CVEListSudo: improper handling of ipa_hostname leads to privilege mismanagement↗2023-12-23 ▶ OSVCVE-2023-7090: A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd↗2023-12-23 ▶ 📋Vendor Advisories
2DebianCVE-2023-7090: sudo - A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname fro...↗2023 ▶ Red Hatsudo: Improper handling of ipa_hostname leads to privilege mismanagement↗2019-08-15 ▶