Apple Researcher Finds Huge Flaw In Linux Sudo Command

Joe Vennix of Apple Information Security found a significant security vulnerability (CVE-2019-14287) in the Linux sudo utility that could have allowed other users to gain unauthorized administrative (“root”) privileges on a Linux machine.

The Sudo command allows specific users to gain administrative privileges on their own user account after they authenticate with the root account’s password. In the Linux world, root is similar to the default Windows Administrator account.

To exploit this bug, a malicious party would need to specify the user ID "-1" or "4294967295” when running the sudo account. This seems to be allowed by the system because the function that converts the user ID into real usernames treats the “-1” and "4294967295” as “0,” which is the user ID for the root user.

TOPICS
Contributor

Lucian Armasu is a Contributing Writer for Tom's Hardware US. He covers software news and the issues surrounding privacy and security.