/

CVE-2019-14287 Report - Details, Severity, & Advisories

CVE-2019-14287 Report - Details, Severity, & Advisories

Twingate Team

Feb 15, 2024

CVE-2019-14287 is a high-severity vulnerability affecting Sudo versions before 1.8.28. It allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, leading to incorrect logging. This vulnerability impacts various systems, including Linux distributions and other platforms that use Sudo for managing user privileges. To protect your system, it's essential to update Sudo to a version that addresses this vulnerability.

How do I know if I'm affected?

To determine if you're affected by the vulnerability, you need to check the version of Sudo installed on your system. The vulnerability affects Sudo versions before 1.8.28 and various Linux distributions, including Fedora versions 29, 30, and 31, Debian versions 8.0, 9.0, and 10.0, openSUSE Leap versions 15.0 and 15.1, Ubuntu versions 12.04, 14.04, 16.04, 18.04, and 19.04, NetApp Element Software Management Node, and Red Hat Enterprise Linux versions 8.0, 6.0, 7.0, and others. If your Sudo version is older than 1.8.28 or you're using one of the affected Linux distributions, you may be vulnerable.

What should I do if I'm affected?

If you're affected by the vulnerability, it's crucial to update your system to a secure version of Sudo. For openSUSE Leap 15.1, use the command "zypper in -t patch openSUSE-2019-2316=1" to install the patch. For Debian, follow the security update instructions provided in the Debian security advisory. For Red Hat Enterprise Linux, refer to the Red Hat security advisory for guidance.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2019-14287 vulnerability is not mentioned as being part of CISA's Known Exploited Vulnerabilities Catalog on the provided sources. This vulnerability, found in Sudo before version 1.8.28, allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, leading to incorrect logging. To protect your system, it's essential to update Sudo to a version that addresses this vulnerability.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-755, which involves improper handling of exceptional conditions. Security updates for affected systems like openSUSE Leap and Red Hat Enterprise Linux address this issue.

For more details

CVE-2019-14287 is a high-severity vulnerability that affects various systems and requires immediate attention. By updating your system and applying the necessary patches, you can protect your resources from potential exploitation. For a comprehensive understanding of the vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

CVE-2019-14287 Report - Details, Severity, & Advisories

CVE-2019-14287 Report - Details, Severity, & Advisories

Twingate Team

Feb 15, 2024

CVE-2019-14287 is a high-severity vulnerability affecting Sudo versions before 1.8.28. It allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, leading to incorrect logging. This vulnerability impacts various systems, including Linux distributions and other platforms that use Sudo for managing user privileges. To protect your system, it's essential to update Sudo to a version that addresses this vulnerability.

How do I know if I'm affected?

To determine if you're affected by the vulnerability, you need to check the version of Sudo installed on your system. The vulnerability affects Sudo versions before 1.8.28 and various Linux distributions, including Fedora versions 29, 30, and 31, Debian versions 8.0, 9.0, and 10.0, openSUSE Leap versions 15.0 and 15.1, Ubuntu versions 12.04, 14.04, 16.04, 18.04, and 19.04, NetApp Element Software Management Node, and Red Hat Enterprise Linux versions 8.0, 6.0, 7.0, and others. If your Sudo version is older than 1.8.28 or you're using one of the affected Linux distributions, you may be vulnerable.

What should I do if I'm affected?

If you're affected by the vulnerability, it's crucial to update your system to a secure version of Sudo. For openSUSE Leap 15.1, use the command "zypper in -t patch openSUSE-2019-2316=1" to install the patch. For Debian, follow the security update instructions provided in the Debian security advisory. For Red Hat Enterprise Linux, refer to the Red Hat security advisory for guidance.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2019-14287 vulnerability is not mentioned as being part of CISA's Known Exploited Vulnerabilities Catalog on the provided sources. This vulnerability, found in Sudo before version 1.8.28, allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, leading to incorrect logging. To protect your system, it's essential to update Sudo to a version that addresses this vulnerability.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-755, which involves improper handling of exceptional conditions. Security updates for affected systems like openSUSE Leap and Red Hat Enterprise Linux address this issue.

For more details

CVE-2019-14287 is a high-severity vulnerability that affects various systems and requires immediate attention. By updating your system and applying the necessary patches, you can protect your resources from potential exploitation. For a comprehensive understanding of the vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or links below.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

CVE-2019-14287 Report - Details, Severity, & Advisories

Twingate Team

Feb 15, 2024

CVE-2019-14287 is a high-severity vulnerability affecting Sudo versions before 1.8.28. It allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, leading to incorrect logging. This vulnerability impacts various systems, including Linux distributions and other platforms that use Sudo for managing user privileges. To protect your system, it's essential to update Sudo to a version that addresses this vulnerability.

How do I know if I'm affected?

To determine if you're affected by the vulnerability, you need to check the version of Sudo installed on your system. The vulnerability affects Sudo versions before 1.8.28 and various Linux distributions, including Fedora versions 29, 30, and 31, Debian versions 8.0, 9.0, and 10.0, openSUSE Leap versions 15.0 and 15.1, Ubuntu versions 12.04, 14.04, 16.04, 18.04, and 19.04, NetApp Element Software Management Node, and Red Hat Enterprise Linux versions 8.0, 6.0, 7.0, and others. If your Sudo version is older than 1.8.28 or you're using one of the affected Linux distributions, you may be vulnerable.

What should I do if I'm affected?

If you're affected by the vulnerability, it's crucial to update your system to a secure version of Sudo. For openSUSE Leap 15.1, use the command "zypper in -t patch openSUSE-2019-2316=1" to install the patch. For Debian, follow the security update instructions provided in the Debian security advisory. For Red Hat Enterprise Linux, refer to the Red Hat security advisory for guidance.

Is this in CISA’s Known Exploited Vulnerabilities Catalog?

The CVE-2019-14287 vulnerability is not mentioned as being part of CISA's Known Exploited Vulnerabilities Catalog on the provided sources. This vulnerability, found in Sudo before version 1.8.28, allows an attacker with access to a Runas ALL sudoer account to bypass certain policy blacklists and session PAM modules, leading to incorrect logging. To protect your system, it's essential to update Sudo to a version that addresses this vulnerability.

Weakness enumeration

The weakness enumeration for this vulnerability is categorized as CWE-755, which involves improper handling of exceptional conditions. Security updates for affected systems like openSUSE Leap and Red Hat Enterprise Linux address this issue.

For more details

CVE-2019-14287 is a high-severity vulnerability that affects various systems and requires immediate attention. By updating your system and applying the necessary patches, you can protect your resources from potential exploitation. For a comprehensive understanding of the vulnerability, including its description, severity, technical details, and known affected software configurations, visit the NVD page or links below.