Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xww5-hh94-wcq9

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

Ссылки

EPSS

Процентиль: 24%
0.00078
Низкий

Связанные уязвимости

ubuntu
около 15 лет назад

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

redhat
около 15 лет назад

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

nvd
около 15 лет назад

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.

debian
около 15 лет назад

The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1. ...

oracle-oval
около 15 лет назад

ELSA-2010-0475: sudo security update (MODERATE)

EPSS

Процентиль: 24%
0.00078
Низкий