Sudo Project Sudo 1.5.7

CPE Details

Sudo Project Sudo 1.5.7
1.5.7
2019-06-09 14:57 +00:00
2019-06-09 14:57 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:sudo_project:sudo:1.5.7:*:*:*:*:*:*:*

Informations

Vendor

sudo_project

Product

sudo

Version

1.5.7

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-7090 2023-12-23 22:33 +00:00 A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
8.8
HIGH
CVE-2023-42465 2023-12-21 23:00 +00:00 Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
7
HIGH
CVE-2023-28486 2023-03-15 23:00 +00:00 Sudo before 1.9.13 does not escape control characters in log messages.
5.3
MEDIUM
CVE-2023-28487 2023-03-15 23:00 +00:00 Sudo before 1.9.13 does not escape control characters in sudoreplay output.
5.3
MEDIUM
CVE-2021-23240 2021-01-12 07:17 +00:00 selinux_edit_copy_tfiles in sudoedit in Sudo before 1.9.5 allows a local unprivileged user to gain file ownership and escalate privileges by replacing a temporary file with a symlink to an arbitrary file target. This affects SELinux RBAC support in permissive mode. Machines without SELinux are not vulnerable.
7.8
HIGH
CVE-2021-23239 2021-01-11 23:00 +00:00 The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.
2.5
LOW
CVE-2005-4890 2019-11-04 17:38 +00:00 There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
7.8
HIGH
CVE-2019-18684 2019-11-04 14:53 +00:00 Sudo through 1.8.29 allows local users to escalate to root if they have write access to file descriptor 3 of the sudo process. This occurs because of a race condition between determining a uid, and the setresuid and openat system calls. The attacker can write "ALL ALL=(ALL) NOPASSWD:ALL" to /proc/#####/fd/3 at a time when Sudo is prompting for a password. NOTE: This has been disputed due to the way Linux /proc works. It has been argued that writing to /proc/#####/fd/3 would only be viable if you had permission to write to /etc/sudoers. Even with write permission to /proc/#####/fd/3, it would not help you write to /etc/sudoers
7
HIGH
CVE-2019-14287 2019-10-17 15:03 +00:00 In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
8.8
HIGH
CVE-2017-1000368 2017-06-05 14:00 +00:00 Todd Miller's sudo version 1.8.20p1 and earlier is vulnerable to an input validation (embedded newlines) in the get_process_ttyname() function resulting in information disclosure and command execution.
8.2
HIGH
CVE-2017-1000367 2017-06-04 22:00 +00:00 Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
6.4
MEDIUM
CVE-2015-5602 2015-11-17 14:00 +00:00 sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
7.2
CVE-2002-0184 2003-04-02 03:00 +00:00 Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded.
7.8
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.