Input Validation Vulnerability in Sudo by Todd Miller
CVE-2017-1000367
Key Information:
- Vendor
- Sudo Project
- Status
- Vendor
- CVE Published:
- 5 June 2017
Badges
Summary
An input validation vulnerability exists in Sudo versions 1.8.20 and earlier, specifically within the get_process_ttyname() function. This flaw may allow an attacker to exploit embedded spaces in user input, potentially leading to unauthorized information disclosure and execution of arbitrary commands. Organizations using affected versions of Sudo should prioritize updates to mitigate these risks and reinforce their overall security posture.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
16% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved