Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-5602

Опубликовано: 17 нояб. 2015
Источник: debian

Описание

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.8.15-1.1package

Примечания

  • http://bugzilla.sudo.ws/show_bug.cgi?id=707

  • http://www.sudo.ws/repos/sudo/rev/9636fd256325

  • https://bugzilla.redhat.com/show_bug.cgi?id=1277426

  • https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1512781

Связанные уязвимости

ubuntu
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

redhat
больше 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

nvd
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

github
больше 3 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."