Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
History

Mon, 05 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2022-11-02T00:00:00.000Z

Updated: 2025-05-05T13:45:19.142Z

Reserved: 2022-10-28T00:00:00.000Z

Link: CVE-2022-43995

cve-icon Vulnrichment

Updated: 2024-08-03T13:47:04.589Z

cve-icon NVD

Status : Modified

Published: 2022-11-02T14:15:16.187

Modified: 2025-05-05T14:15:27.907

Link: CVE-2022-43995

cve-icon Redhat

Severity : Important

Publid Date: 2022-11-02T00:00:00Z

Links: CVE-2022-43995 - Bugzilla