Sudo 1.8.0 through 1.9.12, with the crypt() password...
High severity
Unreviewed
Published
Nov 2, 2022
to the GitHub Advisory Database
•
Updated Feb 2, 2023
Description
Published by the National Vulnerability Database
Nov 2, 2022
Published to the GitHub Advisory Database
Nov 2, 2022
Last updated
Feb 2, 2023
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the compiler and processor architecture.
References