Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2019.3951 FreeBSD 25 October 2019 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: sudo Publisher: FreeBSD Operating System: FreeBSD Impact/Access: Root Compromise -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2019-14287 Reference: ESB-2019.3901 ESB-2019.3839 ESB-2019.3826 Original Bulletin: http://www.vuxml.org/freebsd/3a1474ba-f646-11e9-b0af-b888e347c638.html - --------------------------BEGIN INCLUDED TEXT-------------------- FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection sudo -- Potential bypass of Runas user restrictions Affected packages sudo < 1.8.28 Details VuXML ID 3a1474ba-f646-11e9-b0af-b888e347c638 Discovery 2019-10-15 Entry 2019-10-24 Todd C. Miller reports: When sudo is configured to allow a user to run commands as an arbitrary user via the ALL keyword in a Runas specification, it is possible to run commands as root by specifying the user ID -1 or 4294967295. This can be used by a user with sufficient sudo privileges to run commands as root even if the Runas specification explicitly disallows root access as long as the ALL keyword is listed first in the Runas specification. Log entries for commands run this way will list the target user as 4294967295 instead of root. In addition, PAM session modules will not be run for the command. [source] References CVE Name CVE-2019-14287 URL https://www.sudo.ws/alerts/minus_1_uid.html - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXbJAX2aOgq3Tt24GAQgVJw/+JFEKNadp3bOD2maFNLHq/Nk3eAY2MY+i hdGEMmZtqcaeOBoFvjAL/q7z5Zw8PEJ2lj+m+KD5lsdOcpHu2i2b3KAldZKGkPkv lORE2CRiD9cKp8l0JSdlweKgp5qf4LUW65qXKm/xQm43ajXsFM8E5G+gLwqb49nw IT68ekB7UaPHkzeZl+EEo6J9vW08/IJLTIoT2uxaX3u0RMcGTxxO78qC/vUmLMeC Omyo5X4Hz07netwtvtz2+tLVWz8hOvaytGzJyP8vg4sMJ9oHexzmFZPModx4Hw6n oTyr4L3ER1yZ0zkKNn7H3NYhOC/dAf1pInNAQgoQlWNFKUybokLoLMM+PLGqb45p 1mOTRQEb29PgiIgXCIixzt8mwovkjdKinr/pSaVWcX8qIFzfkZNEbUYIgaZxl5hI pCDAtTszwo40TYdQb+26EidaFbGf6jK9QhYT6DrH8c/zwsU3wgdzTe3907kM4Cl0 0/+KuqJRUaoQMMs0UGtqTsFbqn3UWp3QML05zk86jDbO0zs0GNunzFfvLtOikqbh hI3mH1iBBDQCGGejQ6KrKLJPMuj+LTqifVUte0v61lgQHow6H56N289Qi1KtrDDF VyKUrrQyOeH02I6tURRUcj2HdD7W+CIY23HpDuzMGo95A8DIQgKE0eSsnSH6Yhwx HKv7zpzX3WE= =38Jy -----END PGP SIGNATURE-----