Lucene search

K
Todd MillerSudo1.6.8p7

4 matches found

CVE
CVE
added 2010/04/16 7:30 p.m.87 views

CVE-2010-1163

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Troja...

6.9CVSS8.1AI score0.0076EPSS
CVE
CVE
added 2010/06/07 5:12 p.m.74 views

CVE-2010-1646

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

6.2CVSS6.1AI score0.00078EPSS
CVE
CVE
added 2011/01/20 7:0 p.m.68 views

CVE-2011-0008

A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain roo...

6.9CVSS7.3AI score0.00049EPSS
CVE
CVE
added 2005/06/02 4:0 a.m.47 views

CVE-2005-1831

Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. NOTE: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catche...

8.4CVSS6.8AI score0.00109EPSS