Originally posted by: kali0987
Hi ,
For the vulnerable CVE-2019-14287 ? Understand there is a work around from Redhat , i just want to check if this is also applicable for AIX as the sudoers behaviours should be come accross all UNIX platforms.
Below is the work around details , please advise.
The exclusioin is specified using a excalamation mark (!) . Instead of specifying root user just specify with user ID.
someuser ALL=(ALL, !#0) /usr/bin/somecommand
or by reference to a runas alias:
runas_Alias MYGROUP = root, adminuser
someuser ALL=(ALL, !MYGROUP) /usr/bin/somecommand.
To ensure sudoers configuration is not effected by this vulnerabilty , recommendation is to examine each sudoers entry that includes the '!' character in the runas specification , to ensure that the root user is not among exclusions.