Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jc33-cg9p-57rj

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.

sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.

EPSS

Процентиль: 41%
0.00193
Низкий

Связанные уязвимости

redhat
больше 23 лет назад

sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.

nvd
больше 23 лет назад

sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.

fstec
больше 23 лет назад

Уязвимость операционной системы Red Hat Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 41%
0.00193
Низкий