heroui logo

Sudo Privilege Escalation CVE-2019-14287 - Builtin

Sigma Rules

View Source
Summary
This detection rule focuses on identifying attempts to exploit a known vulnerability in the 'sudo' command on Linux systems, specifically CVE-2019-14287. This vulnerability allows users to run commands with elevated privileges by specifying a user who has administrative access, effectively circumventing standard access controls. The rule captures any user actions that match the targeted patterns indicating potential privilege escalation attempts via 'sudo'. Specifically, it tracks actions by users, including anyone who attempts to run commands as user ID 4294967295 (which corresponds to the 'nobody' user on many systems). The aim of this rule is to prevent unauthorized access, enhance security, and enable incident detection associated with this vulnerability by monitoring and alerting on relevant patterns in 'sudo' command usage.
Categories
  • Linux
  • Endpoint
Data Sources
  • User Account
  • Command
Created: 2019-10-15