【安全公告:UTSA-2022-000615】-【CVE-2022-43995】

发布日期:2022-11-12

基本信息

漏洞编号: CVE-2022-43995

受影响系统版本: 服务器E版

受影响源码包: sudo

修复版本: 1.9.2-7.uel20

CWE编号: CWE-125

漏洞等级: 高危

CVSS_v3评分: 7.1

漏洞描述

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

修复方式

yum update PackageName

是否受影响判断

判断方法:yum info PackageName
结果说明:版本小于修复版本,则受此漏洞影响,版本大于等于修复版本,则此漏洞已修复。

补丁链接

暂无