Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-1775

Опубликовано: 05 мар. 2013
Источник: debian
EPSS Низкий

Описание

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.8.5p2-1+nmu1package

Примечания

  • severity depends a lot on the environment

EPSS

Процентиль: 84%
0.02226
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

redhat
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

nvd
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

github
больше 3 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

oracle-oval
больше 11 лет назад

ELSA-2013-1701: sudo security, bug fix and enhancement update (LOW)

EPSS

Процентиль: 84%
0.02226
Низкий