Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3f5j-4h2q-jfx9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

EPSS

Процентиль: 84%
0.02226
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

redhat
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

nvd
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

debian
больше 12 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows loca ...

oracle-oval
больше 11 лет назад

ELSA-2013-1701: sudo security, bug fix and enhancement update (LOW)

EPSS

Процентиль: 84%
0.02226
Низкий