7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
5.2%
sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be “a user, who can already log into your system, and can already use sudo.”
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | sudo | < 1.9.13p3-1+deb12u1 | sudo_1.9.13p3-1+deb12u1_all.deb |
Debian | 11 | all | sudo | < 1.9.5p2-3+deb11u1 | sudo_1.9.5p2-3+deb11u1_all.deb |
Debian | 10 | all | sudo | < 1.8.27-1+deb10u3 | sudo_1.8.27-1+deb10u3_all.deb |
Debian | 999 | all | sudo | < 1.9.15p5-3 | sudo_1.9.15p5-3_all.deb |
Debian | 13 | all | sudo | < 1.9.15p5-3 | sudo_1.9.15p5-3_all.deb |