Amazon Linux 2 : sudo (ALAS-2019-1315)

high Nessus Plugin ID 129851

Synopsis

The remote Amazon Linux 2 host is missing a security update.

Description

When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295.

This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification. (CVE-2019-14287)

Further details can be found here:
https://www.sudo.ws/alerts/minus_1_uid.html

A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.(CVE-2017-1000367)

It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root.(CVE-2017-1000368)

Solution

Run 'yum update sudo' to update your system.

See Also

https://alas.aws.amazon.com/AL2/ALAS-2019-1315.html

Plugin Details

Severity: High

ID: 129851

File Name: al2_ALAS-2019-1315.nasl

Version: 1.7

Type: local

Agent: unix

Published: 10/15/2019

Updated: 1/23/2023

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-14287

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:amazon:linux:2, p-cpe:/a:amazon:linux:sudo-debuginfo, p-cpe:/a:amazon:linux:sudo-devel, p-cpe:/a:amazon:linux:sudo

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 10/11/2019

Vulnerability Publication Date: 6/5/2017

Exploitable With

Core Impact

Reference Information

CVE: CVE-2017-1000367, CVE-2017-1000368, CVE-2019-14287

ALAS: 2019-1315

IAVA: 2019-A-0378-S