Lucene search

K
ubuntuUbuntuUSN-1754-1
HistoryFeb 28, 2013 - 12:00 a.m.

Sudo vulnerability

2013-02-2800:00:00
ubuntu.com
29

6.5 Medium

AI Score

Confidence

Low

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.1%

Releases

  • Ubuntu 12.10
  • Ubuntu 12.04
  • Ubuntu 11.10
  • Ubuntu 10.04
  • Ubuntu 8.04

Packages

  • sudo - Provide limited super user privileges to specific users

Details

Marco Schoepl discovered that Sudo incorrectly handled time stamp files
when the system clock is set to epoch. A local attacker could use this
issue to run Sudo commands without a password prompt.

OSVersionArchitecturePackageVersionFilename
Ubuntu8.04noarchsudo-ldap< 1.6.9p10-1ubuntu3.10UNKNOWN
Ubuntu8.04noarchsudo< 1.6.9p10-1ubuntu3.10UNKNOWN
Ubuntu12.10noarchsudo-ldap< 1.8.5p2-1ubuntu1.1UNKNOWN
Ubuntu12.10noarchsudo< 1.8.5p2-1ubuntu1.1UNKNOWN
Ubuntu12.04noarchsudo-ldap< 1.8.3p1-1ubuntu3.4UNKNOWN
Ubuntu12.04noarchsudo< 1.8.3p1-1ubuntu3.4UNKNOWN
Ubuntu11.10noarchsudo-ldap< 1.7.4p6-1ubuntu2.2UNKNOWN
Ubuntu11.10noarchsudo< 1.7.4p6-1ubuntu2.2UNKNOWN
Ubuntu10.04noarchsudo-ldap< 1.7.2p1-1ubuntu5.6UNKNOWN
Ubuntu10.04noarchsudo< 1.7.2p1-1ubuntu5.6UNKNOWN

6.5 Medium

AI Score

Confidence

Low

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.1%