Vulnerability CVE-2018-10852


Published: 2018-06-26

Description:
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Redhat -> Enterprise linux desktop 
Redhat -> Enterprise linux server 
Redhat -> Enterprise linux workstation 
Fedoraproject -> SSSD 
Debian -> Debian linux 

 References:
http://www.securityfocus.com/bid/104547
https://access.redhat.com/errata/RHSA-2018:3158
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
https://lists.debian.org/debian-lts-announce/2018/07/msg00019.html

Copyright 2024, cxsecurity.com

 

Back to Top