Lucene search

K
ubuntuUbuntuUSN-956-1
HistoryJun 30, 2010 - 12:00 a.m.

sudo vulnerability

2010-06-3000:00:00
ubuntu.com
37

6.8 Medium

AI Score

Confidence

Low

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.4%

Releases

  • Ubuntu 10.04
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • sudo - Provide limited super user privileges to specific users

Details

Evan Broder and Anders Kaseorg discovered that sudo did not properly
sanitize its environment when configured to use secure_path (the default in
Ubuntu). A local attacker could exploit this to execute arbitrary code as
root if sudo was configured to allow the attacker to use a program that
interpreted the PATH environment variable.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchsudo-ldap< 1.7.0-1ubuntu2.4UNKNOWN
Ubuntu9.10noarchsudo< 1.7.0-1ubuntu2.4UNKNOWN
Ubuntu9.04noarchsudo-ldap< 1.6.9p17-1ubuntu3.3UNKNOWN
Ubuntu9.04noarchsudo< 1.6.9p17-1ubuntu3.3UNKNOWN
Ubuntu8.04noarchsudo-ldap< 1.6.9p10-1ubuntu3.8UNKNOWN
Ubuntu8.04noarchsudo< 1.6.9p10-1ubuntu3.8UNKNOWN
Ubuntu6.06noarchsudo-ldap< 1.6.8p12-1ubuntu6.3UNKNOWN
Ubuntu6.06noarchsudo< 1.6.8p12-1ubuntu6.3UNKNOWN
Ubuntu10.04noarchsudo-ldap< 1.7.2p1-1ubuntu5.1UNKNOWN
Ubuntu10.04noarchsudo< 1.7.2p1-1ubuntu5.1UNKNOWN

6.8 Medium

AI Score

Confidence

Low

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.4%