• About
  • Advertise
  • Careers
  • Contact
  • About
Sunday, January 18, 2026
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

Linux sudo flaw can lead to unauthorized privileges

in Tech
Linux sudo flaw can lead to unauthorized privileges
0
SHARES
23
VIEWS
Share on FacebookShare on Twitter

A newly discovered and serious flaw in the sudo command can, if exploited, enable users to run commands as root in spite of the fact that the syntax of the /etc/sudoers file specifically disallows them from doing so.

Updating sudo to version 1.8.28 should address the problem, and Linux admins are encouraged to do so as soon as possible.

How the flaw might be exploited depends on specific privileges granted in the /etc/sudoers file. A rule that allows a user to edit files as any user except root, for example, would actually allow that user to edit files as root as well. In this case, the flaw could lead to very serious problems.

For a user to exploit the flaw,a user needs to be assigned privileges in the/etc/sudoersfile that allow that user to run commands as some other users, and the flaw is limited to the command privileges that are assigned in this way.

This problem affects versions prior to 1.8.28. To check your sudo version, use this command:

$ sudo -V
Sudo version 1.8.27
Sudoers policy plugin version 1.8.27
Sudoers file grammar version 46
Sudoers I/O plugin version 1.8.27

The vulnerability has been assignedCVE-2019-14287 in the Common Vulnerabilities and Exposures database. The risk is that any user who has been given the ability to run even a single command as an arbitrary user may be able to escape the restrictions and run that command as root – even if the specified privilege is written to disallow running the command as root.

The lines below are meant to give the user “jdoe” the ability to edit files with vi as any user except root (!root means “not root”) and nemo the right to run the id command as any user except root:

# affected entries on host "dragonfly"
jdoe dragonfly = (ALL, !root) /usr/bin/vi
nemo dragonfly = (ALL, !root) /usr/bin/id

However, given the flaw, either of these users would be able to circumvent the restriction and edit files or run the id command as root as well.

The flaw can be exploited by an attacker to run commands as root by specifying the user ID “-1” or “4294967295.”

The response of “1” demonstrates that the command is being run as root (showing root’s user ID).

Joe Vennix from Apple Information Security both found and analyzed the problem.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Premium WordPress Themes Download
Download Premium WordPress Themes Free
Download Best WordPress Themes Free Download
Download WordPress Themes Free
udemy course download free
download redmi firmware
Free Download WordPress Themes
free download udemy paid course
ADVERTISEMENT
Next Post
Beamforming explained: How it makes wireless communication faster

Beamforming explained: How it makes wireless communication faster

Recommended

FCC wants to add a new swath of bandwidth to Wi-Fi 6

FCC wants to add a new swath of bandwidth to Wi-Fi 6

VMware plan elevates Kubernetes to star enterprise status

VMware plan elevates Kubernetes to star enterprise status

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In