A new vulnerability has been discovered in the Linux Sudo program let unprivileged users can run the command as root by specifying the user ID -1 or 4294967295.
Sudo (Superuser Do) program in Linux is responsible to allocate the security privileges to run commands for normal users and by default for Superusers.
The vulnerability affected the Sudo versions before 1.8.28 and the potential users to bypass the Runas user restrictions.
Runas basically referred to allow a Linux user to start an application with different user credentials, and it restricts the users to gain other privileged access.
Based on the Sudo users policy, If ALL keyword in a Runas specification, then any user to run commands as an arbitrary user.
To exploit the bug, the users should have Sudo privilege, which means, the user’s entry in Runas specifier with special value ALL, so that users can run a command as an arbitrary user.
In the above command with (ALL) in Runas Specifier, a user can run the command as any users, also able to run it as an arbitrary user ID by using the #uid syntax.
In this case, when we treat user ID -1 or 4294967295 (unsigned equivalent for -1 ), the result returns 0 (Not root).
“So If a sudoers entry is written to allow the user to run a command as any user except root, the bug can be used to avoid this restriction,” Joe Vennix from Apple Information Security said.
The vulnerability affected only sudoers entries where Runas specifier with ALL keyword and the vulnerability has been assigned CVE-2019-14287
It’s highly recommended to update the newly released Sudo 1.8.28 version in your Linux and soon the update will be rolled out for all the Linux distributions.
the nearest dump furniture store the dump furniture sale