Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-7076
HistoryMay 29, 2018 - 12:00 a.m.

CVE-2016-7076

2018-05-2900:00:00
ubuntu.com
ubuntu.com
17

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%

sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec
restriction if application run via sudo executed wordexp() C library
function with a user supplied argument. A local user permitted to run such
application via sudo with noexec restriction could possibly use this flaw
to execute arbitrary commands with elevated privileges.

Notes

Author Note
seth-arnold See also CVE-2016-7032 This alert mentions a seccomp-based filter. If we decide to backport that filter for this CVE, and CVE-2016-7032, then โ€˜mediumโ€™ may continue to be appropriate. If we decide the seccomp-based filter is not suitable for a backport, then perhaps โ€˜negligibleโ€™ would be appropriate.
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchsudo<ย 1.8.9p5-1ubuntu1.5+esm5) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchsudo<ย 1.8.16-0ubuntu1.6UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

5.3%