NA

CVE-2022-43995

Published: 02/11/2022 Updated: 06/12/2022
CVSS v3 Base Score: 7.1 | Impact Score: 5.2 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Sudo 1.8.0 up to and including 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

sudo project sudo 1.9.12

sudo project sudo

Vendor Advisories

DescriptionThe MITRE CVE dictionary describes this issue as: Sudo 180 through 1912, with the crypt() password backend, contains a plugins/sudoers/auth/passwdc array-out-of-bounds error that can result in a heap-based buffer over-read This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters ...
ALAS-2023-289 Amazon Linux 2022 Security Advisory: ALAS-2023-289 Advisory Release Date: 2023-01-31 21:12 Pacific Advisory Updated Date: 2023-01-31 21:12 Pac ...