7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
sudo is vulnerable to authorization bypass. This is due to improper handling of multiple IP networks listed in user specification configuration directives. A local user who is authorized to run commands with sudo
on specific hosts is able to bypass restrictions and run commands on hosts that are not matched by any of the network specifications.
lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html
secunia.com/advisories/49219
secunia.com/advisories/49244
secunia.com/advisories/49291
secunia.com/advisories/49948
www.debian.org/security/2012/dsa-2478
www.mandriva.com/security/advisories?name=MDVSA-2012:079
www.securitytracker.com/id?1027077
www.sudo.ws/sudo/alerts/netmask.html
access.redhat.com/security/updates/classification/#moderate
bugzilla.redhat.com/show_bug.cgi?id=820677
rhn.redhat.com/errata/RHSA-2012-1081.html
www.suse.com/security/cve/CVE-2012-2337/