Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-7091

Опубликовано: 22 дек. 2016
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 4.4

Описание

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

not-affected

esm-infra/xenial

not-affected

precise

not-affected

trusty

not-affected

trusty/esm

not-affected

upstream

needs-triage

vivid/stable-phone-overlay

not-affected

vivid/ubuntu-core

not-affected

xenial

not-affected

Показывать по

Ссылки на источники

EPSS

Процентиль: 24%
0.0008
Низкий

4.9 Medium

CVSS2

4.4 Medium

CVSS3

Связанные уязвимости

redhat
больше 9 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

CVSS3: 4.4
nvd
больше 8 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

CVSS3: 4.4
debian
больше 8 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat ...

CVSS3: 4.4
github
больше 3 лет назад

sudo: It was discovered that the default sudo configuration on Red Hat Enterprise Linux and possibly other Linux implementations preserves the value of INPUTRC which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo.

oracle-oval
почти 9 лет назад

ELSA-2016-2593: sudo security, bug fix, and enhancement update (LOW)

EPSS

Процентиль: 24%
0.0008
Низкий

4.9 Medium

CVSS2

4.4 Medium

CVSS3

Уязвимость CVE-2016-7091