{ "schema_version": "1.4.0", "id": "GHSA-v7hw-ff58-vxfm", "modified": "2025-04-20T03:38:30Z", "published": "2022-05-14T01:00:16Z", "aliases": [ "CVE-2017-1000368" ], "details": "Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-1000368" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2017:1574" }, { "type": "WEB", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10205" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201710-04" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3968-1" }, { "type": "WEB", "url": "https://usn.ubuntu.com/3968-2" }, { "type": "WEB", "url": "https://www.sudo.ws/alerts/linux_tty.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/98838" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-06-05T16:29:00Z" } }