Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-5602

Опубликовано: 17 нояб. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2

Описание

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home///file.txt."

РелизСтатусПримечание
artful

not-affected

1.8.16-0ubuntu1
bionic

not-affected

1.8.16-0ubuntu1
cosmic

not-affected

1.8.16-0ubuntu1
devel

not-affected

1.8.16-0ubuntu1
disco

not-affected

1.8.16-0ubuntu1
eoan

not-affected

1.8.16-0ubuntu1
esm-infra-legacy/trusty

ignored

esm-infra/bionic

not-affected

1.8.16-0ubuntu1
esm-infra/focal

not-affected

1.8.16-0ubuntu1
esm-infra/xenial

not-affected

1.8.16-0ubuntu1

Показывать по

EPSS

Процентиль: 90%
0.05506
Низкий

7.2 High

CVSS2

Связанные уязвимости

redhat
больше 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

nvd
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

debian
около 10 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges v ...

github
больше 3 лет назад

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

EPSS

Процентиль: 90%
0.05506
Низкий

7.2 High

CVSS2