Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1163

Опубликовано: 13 апр. 2010
Источник: redhat
CVSS2: 6
EPSS Низкий

Описание

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 3sudoNot affected
Red Hat Enterprise Linux 4sudoNot affected
Red Hat Enterprise Linux 6sudoNot affected
Red Hat Enterprise Linux 5sudoFixedRHSA-2010:036120.04.2010

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=580441sudo: incomplete fix for the sudoedit privilege escalation issue CVE-2010-0426

EPSS

Процентиль: 13%
0.00045
Низкий

6 Medium

CVSS2

Связанные уязвимости

ubuntu
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

nvd
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

debian
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does ...

github
около 3 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

oracle-oval
около 15 лет назад

ELSA-2010-0361: sudo security update (MODERATE)

EPSS

Процентиль: 13%
0.00045
Низкий

6 Medium

CVSS2