Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-3067

Опубликовано: 07 июл. 2008
Источник: debian
EPSS Низкий

Описание

sudo in SUSE openSUSE 10.3 does not clear the stdin buffer when password entry times out, which might allow local users to obtain a password by reading stdin from the parent process after a sudo child process exits.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.6.9p12-1package
sudonot-affectedetchpackage

EPSS

Процентиль: 18%
0.00057
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

sudo in SUSE openSUSE 10.3 does not clear the stdin buffer when password entry times out, which might allow local users to obtain a password by reading stdin from the parent process after a sudo child process exits.

redhat
около 17 лет назад

sudo in SUSE openSUSE 10.3 does not clear the stdin buffer when password entry times out, which might allow local users to obtain a password by reading stdin from the parent process after a sudo child process exits.

nvd
около 17 лет назад

sudo in SUSE openSUSE 10.3 does not clear the stdin buffer when password entry times out, which might allow local users to obtain a password by reading stdin from the parent process after a sudo child process exits.

github
больше 3 лет назад

sudo in SUSE openSUSE 10.3 does not clear the stdin buffer when password entry times out, which might allow local users to obtain a password by reading stdin from the parent process after a sudo child process exits.

EPSS

Процентиль: 18%
0.00057
Низкий