Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
[
{
"digest": {
"line_hashes": [
"337633252920991241112857162465452390298",
"262853266045190752843127941413843408656",
"61690952090159972777364936005601145194",
"128035712224375988314427638006103912115",
"94127008450240786502871837663103258118",
"98733321982592306874869601466115003794",
"8004731231940764953004213991397676849",
"221443112049861906691759667364935375915",
"113536667263124047403014320319250631257",
"267568419315262234764733117499065506321",
"181495643499762969102095757999593662642",
"224122946542034265895270638157337010187",
"26387421224791964521672678200805934154"
],
"threshold": 0.9
},
"id": "CVE-2022-43995-583b6dec",
"signature_version": "v1",
"target": {
"file": "plugins/sudoers/auth/passwd.c"
},
"source": "https://github.com/sudo-project/sudo/commit/bd209b9f16fcd1270c13db27ae3329c677d48050",
"deprecated": false,
"signature_type": "Line"
},
{
"digest": {
"function_hash": "98815895881217986653558569722860438731",
"length": 679.0
},
"id": "CVE-2022-43995-773384c8",
"signature_version": "v1",
"target": {
"file": "plugins/sudoers/auth/passwd.c",
"function": "sudo_passwd_verify"
},
"source": "https://github.com/sudo-project/sudo/commit/bd209b9f16fcd1270c13db27ae3329c677d48050",
"deprecated": false,
"signature_type": "Function"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-43995.json"