← Back to CVEs
CVE-2019-15900
CRITICAL9.8
Description
An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published10/18/2019
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
doas_project:doas
Weaknesses (CWE)
CWE-252CWE-754CWE-863CWE-908
References
https://github.com/slicer69/doas/compare/6.1p1...6.2(cve@mitre.org)
https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/slicer69/doas/compare/6.1p1...6.2(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.