Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-0426

Опубликовано: 24 фев. 2010
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.9

Описание

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

РелизСтатусПримечание
dapper

released

1.6.8p12-1ubuntu6.1
devel

released

1.7.2p1-1ubuntu2
hardy

released

1.6.9p10-1ubuntu3.6
intrepid

released

1.6.9p17-1ubuntu2.2
jaunty

released

1.6.9p17-1ubuntu3.1
karmic

released

1.7.0-1ubuntu2.1
upstream

released

1.6.9p21, 1.7.2p4

Показывать по

EPSS

Процентиль: 72%
0.0076
Низкий

6.9 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

nvd
больше 15 лет назад

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

debian
больше 15 лет назад

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-com ...

github
около 3 лет назад

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

oracle-oval
больше 15 лет назад

ELSA-2010-0122: sudo security update (IMPORTANT)

EPSS

Процентиль: 72%
0.0076
Низкий

6.9 Medium

CVSS2