Описание
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system() or popen() C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use this flaw to execute arbitrary commands with elevated privileges.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | sudo | Will not fix | ||
| Red Hat Enterprise Linux 6 | sudo | Fixed | RHSA-2016:2872 | 06.12.2016 |
| Red Hat Enterprise Linux 7 | sudo | Fixed | RHSA-2016:2872 | 06.12.2016 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.4 Medium
CVSS3
6.6 Medium
CVSS2
Связанные уязвимости
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users ...
sudo_noexec.so in Sudo before 1.8.15 on Linux might allow local users to bypass intended noexec command restrictions via an application that calls the (1) system or (2) popen function.
EPSS
6.4 Medium
CVSS3
6.6 Medium
CVSS2