vulnerability

FreeBSD: VID-6193B3F6-548C-11EB-BA01-206A8A720317 (CVE-2021-23239): sudo -- Potential information leak in sudoedit

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Jan 11, 2021
Added
Jan 12, 2021
Modified
Mar 8, 2021

Description

Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.


From VID-6193B3F6-548C-11EB-BA01-206A8A720317:




Todd C. Miller reports:



A potential information leak in sudoedit that could be used to


test for the existence of directories not normally accessible to


the user in certain circumstances. When creating a new file,


sudoedit checks to make sure the parent directory of the new file


exists before running the editor. However, a race condition exists


if the invoking user can replace (or create) the parent directory.


If a symbolic link is created in place of the parent directory,


sudoedit will run the editor as long as the target of the link


exists.If the target of the link does not exist, an error message


will be displayed. The race condition can be used to test for the


existence of an arbitrary directory. However, it _cannot_ be used


to write to an arbitrary location.




Solution

freebsd-upgrade-package-sudo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.