Learn about CVE-2022-43995, a vulnerability in Sudo 1.8.0 through 1.9.12 with the crypt() password backend, allowing local users to trigger a heap-based buffer over-read.
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
Understanding CVE-2022-43995
This article provides insights into the CVE-2022-43995 vulnerability in Sudo, affecting versions 1.8.0 through 1.9.12 with the crypt() password backend.
What is CVE-2022-43995?
CVE-2022-43995 is an array-out-of-bounds error in the plugins/sudoers/auth/passwd.c file of Sudo. This vulnerability can lead to a heap-based buffer over-read.
The Impact of CVE-2022-43995
The vulnerability allows arbitrary local users with Sudo access to trigger the issue by entering a password of seven characters or fewer. The severity of the impact can vary based on factors like system libraries, compiler, and processor architecture.
Technical Details of CVE-2022-43995
Below are the specific technical details related to CVE-2022-43995.
Vulnerability Description
The vulnerability in Sudo 1.8.0 through 1.9.12 with the crypt() password backend can result in a heap-based buffer over-read due to an array-out-of-bounds error in the passwd.c file.
Affected Systems and Versions
All versions of Sudo 1.8.0 through 1.9.12 with the crypt() password backend are affected by this vulnerability.
Exploitation Mechanism
Arbitrary local users with Sudo access can exploit the vulnerability by entering a password of seven characters or fewer.
Mitigation and Prevention
Understanding the mitigation strategies and preventive measures for CVE-2022-43995.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates