Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3f5j-4h2q-jfx9

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

EPSS

Процентиль: 92%
0.0813
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

redhat
почти 13 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

nvd
почти 13 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

debian
почти 13 лет назад

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows loca ...

oracle-oval
около 12 лет назад

ELSA-2013-1701: sudo security, bug fix and enhancement update (LOW)

EPSS

Процентиль: 92%
0.0813
Низкий