Lucene search

K
freebsdFreeBSD764344FB-8214-11E2-9273-902B343DEEC9
HistoryFeb 27, 2013 - 12:00 a.m.

sudo -- Authentication bypass when clock is reset

2013-02-2700:00:00
vuxml.freebsd.org
42

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.2%

Todd Miller reports:

The flaw may allow someone with physical access to a machine that
is not password-protected to run sudo commands without knowing the
logged in user’s password. On systems where sudo is the principal
way of running commands as root, such as on Ubuntu and Mac OS X,
there is a greater chance that the logged in user has run sudo
before and thus that an attack would succeed.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsudo< 1.8.6.p7UNKNOWN

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.2%