{"id":"CVE-2017-1000367","details":"Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.","modified":"2026-04-16T01:41:27.492390626Z","published":"2017-06-05T14:29:00.200Z","related":["SUSE-SU-2017:1446-1","SUSE-SU-2017:1450-1","openSUSE-SU-2024:11413-1"],"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2022/12/22/5"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2022/12/22/6"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEXC4NNIG2QOZY6N2YUK246KI3D3UQO/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00077.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00078.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2017-05/msg00079.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2017/Jun/3"},{"type":"ADVISORY","url":"http://www.debian.org/security/2017/dsa-3867"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/98745"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3304-1"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1381"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1382"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-15"},{"type":"ADVISORY","url":"https://www.exploit-db.com/exploits/42183/"},{"type":"ADVISORY","url":"https://www.sudo.ws/alerts/linux_tty.html"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html"},{"type":"EVIDENCE","url":"http://www.openwall.com/lists/oss-security/2017/05/30/16"},{"type":"EVIDENCE","url":"http://www.securitytracker.com/id/1038582"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/millert/sudo","events":[{"introduced":"0"},{"last_affected":"54a5f94e07d7f6c69750d181f06d74f49d0663d1"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"1.8.20"}],"cpe":"cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["SUDO_1_3_0","SUDO_1_3_1","SUDO_1_4_0","SUDO_1_5_0","SUDO_1_5_1","SUDO_1_5_2","SUDO_1_5_3","SUDO_1_5_4","SUDO_1_5_6","SUDO_1_5_7","SUDO_1_5_8","SUDO_1_5_9","SUDO_1_6_0","SUDO_1_6_1","SUDO_1_6_2","SUDO_1_6_3","SUDO_1_6_4","SUDO_1_6_5","SUDO_1_6_6","SUDO_1_6_7","SUDO_1_6_8","SUDO_1_6_8p1","SUDO_1_7_0","SUDO_1_7_1","SUDO_1_7_2","SUDO_1_8_0","SUDO_1_8_1","SUDO_1_8_10","SUDO_1_8_10p1","SUDO_1_8_10p2","SUDO_1_8_10p3","SUDO_1_8_11","SUDO_1_8_11p1","SUDO_1_8_11p2","SUDO_1_8_12","SUDO_1_8_13","SUDO_1_8_14","SUDO_1_8_14p1","SUDO_1_8_14p3","SUDO_1_8_15","SUDO_1_8_16","SUDO_1_8_17","SUDO_1_8_17p1","SUDO_1_8_18","SUDO_1_8_18p1","SUDO_1_8_19","SUDO_1_8_19p1","SUDO_1_8_19p2","SUDO_1_8_2","SUDO_1_8_20","SUDO_1_8_3","SUDO_1_8_4","SUDO_1_8_4p1","SUDO_1_8_4p2","SUDO_1_8_4p3","SUDO_1_8_4p4","SUDO_1_8_4p5","SUDO_1_8_5","SUDO_1_8_5p1","SUDO_1_8_5p2","SUDO_1_8_5p3","SUDO_1_8_6","SUDO_1_8_6p1","SUDO_1_8_6p2","SUDO_1_8_6p3","SUDO_1_8_6p4","SUDO_1_8_6p5","SUDO_1_8_6p6","SUDO_1_8_6p7","SUDO_1_8_6p8","SUDO_1_8_7","SUDO_1_8_8","SUDO_1_8_9","SUDO_1_8_9p1","SUDO_1_8_9p2","SUDO_1_8_9p3","SUDO_1_8_9p4","SUDO_1_8_9p5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-1000367.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}]}