7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.3%
Issue Overview:
A flaw was found in the way the network matching code in sudo handled multiple IP networks listed in user specification configuration directives. A user, who is authorized to run commands with sudo on specific hosts, could use this flaw to bypass intended restrictions and run those commands on hosts not matched by any of the network specifications. (CVE-2012-2337)
Affected Packages:
sudo
Issue Correction:
Run yum update sudo to update your system.
New Packages:
i686:
sudo-debuginfo-1.7.4p5-12.14.amzn1.i686
sudo-1.7.4p5-12.14.amzn1.i686
src:
sudo-1.7.4p5-12.14.amzn1.src
x86_64:
sudo-debuginfo-1.7.4p5-12.14.amzn1.x86_64
sudo-1.7.4p5-12.14.amzn1.x86_64
Red Hat: CVE-2012-2337
Mitre: CVE-2012-2337
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | sudo-debuginfo | < 1.7.4p5-12.14.amzn1 | sudo-debuginfo-1.7.4p5-12.14.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | sudo | < 1.7.4p5-12.14.amzn1 | sudo-1.7.4p5-12.14.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | sudo-debuginfo | < 1.7.4p5-12.14.amzn1 | sudo-debuginfo-1.7.4p5-12.14.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | sudo | < 1.7.4p5-12.14.amzn1 | sudo-1.7.4p5-12.14.amzn1.x86_64.rpm |