Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-5602

Опубликовано: 23 июл. 2015
Источник: redhat
CVSS2: 6.8

Описание

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home///file.txt."

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5sudoWill not fix
Red Hat Enterprise Linux 6sudoWill not fix
Red Hat Enterprise Linux 7sudoWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-59
https://bugzilla.redhat.com/show_bug.cgi?id=1277426sudo: Unauthorized privilege escalation in sudoedit

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

nvd
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

debian
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges v ...

github
больше 3 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

6.8 Medium

CVSS2