Ask the Community
Groups
CVE-2017-1000368 sudo: Privilege escalation via improper get_process_ttyname parsing - Connect IT Community | Kaseya
<main> <article class="userContent"> <h3 data-id="cve-id"><strong>CVE ID</strong></h3> <p>CVE-2017-1000368</p> <h3 data-id="description"><strong>DESCRIPTION</strong></h3> <p>It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw<br>was found in the way sudo parsed tty information from the process status file<br>in the proc filesystem. A local user with privileges to execute commands via<br>sudo could use this flaw to escalate their privileges to root.<br><br>CVSS3 Base Score 7.3<br>Related CVEs: CVE-2017-1000367</p> <h3 data-id="resolution"><strong>RESOLUTION</strong></h3> <p>Fixed in latest Unitrends security update with<br> sudo-1.8.6p3-29.el6_9</p> <h3 data-id="link-to-advisories"><strong>LINK TO ADVISORIES</strong></h3> <p></p> <ul><li><a rel="nofollow" href="/home/leaving?allowTrusted=1&target=https%3A%2F%2Fnvd.nist.gov%2Fvuln%2Fdetail%2FCVE-2017-1000368%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2017-1000368%250D%250Ahttps%3A%2F%2Faccess.redhat.com%2Fsecurity%2Fcve%2Fcve-2017-1000367">https://nvd.nist.gov/vuln/detail/CVE-2017-1000368 https://access.redhat.com/security/cve/cve-2017-1000368 https://access.redhat.com/security/cve/cve-2017-1000367</a></li></ul> </article> </main>