Логотип exploitDog
bind: "CVE-2023-22809"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2023-22809"

Количество 20

Количество 20

ubuntu логотип

CVE-2023-22809

почти 3 года назад

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
EPSS: Средний
redhat логотип

CVE-2023-22809

почти 3 года назад

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
EPSS: Средний
nvd логотип

CVE-2023-22809

почти 3 года назад

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
EPSS: Средний
msrc логотип

CVE-2023-22809

2 месяца назад

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
EPSS: Средний
debian логотип

CVE-2023-22809

почти 3 года назад

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extr ...

CVSS3: 7.8
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0117-1

почти 3 года назад

Security update for sudo

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0116-1

почти 3 года назад

Security update for sudo

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0115-1

почти 3 года назад

Security update for sudo

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0114-1

почти 3 года назад

Security update for sudo

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0101-1

почти 3 года назад

Security update for sudo

EPSS: Средний
suse-cvrf логотип

SUSE-SU-2023:0100-1

почти 3 года назад

Security update for sudo

EPSS: Средний
rocky логотип

RLSA-2023:0284

почти 3 года назад

Important: sudo security update

EPSS: Средний
rocky логотип

RLSA-2023:0282

почти 3 года назад

Important: sudo security update

EPSS: Средний
github логотип

GHSA-3vwp-294x-6v9c

почти 3 года назад

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
EPSS: Средний
oracle-oval логотип

ELSA-2023-12143

почти 3 года назад

ELSA-2023-12143: sudo security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-0291

почти 3 года назад

ELSA-2023-0291: sudo security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-0284

почти 3 года назад

ELSA-2023-0284: sudo security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-0282

почти 3 года назад

ELSA-2023-0282: sudo security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2023-00210

почти 3 года назад

Уязвимость функции sudoedit программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.3
EPSS: Средний
redos логотип

ROS-20230124-01

почти 3 года назад

Уязвимость Sudo

CVSS3: 7.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
50%
Средний
почти 3 года назад
redhat логотип
CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
50%
Средний
почти 3 года назад
nvd логотип
CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
50%
Средний
почти 3 года назад
msrc логотип
CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
50%
Средний
2 месяца назад
debian логотип
CVE-2023-22809

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extr ...

CVSS3: 7.8
50%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0117-1

Security update for sudo

50%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0116-1

Security update for sudo

50%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0115-1

Security update for sudo

50%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0114-1

Security update for sudo

50%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0101-1

Security update for sudo

50%
Средний
почти 3 года назад
suse-cvrf логотип
SUSE-SU-2023:0100-1

Security update for sudo

50%
Средний
почти 3 года назад
rocky логотип
RLSA-2023:0284

Important: sudo security update

50%
Средний
почти 3 года назад
rocky логотип
RLSA-2023:0282

Important: sudo security update

50%
Средний
почти 3 года назад
github логотип
GHSA-3vwp-294x-6v9c

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.

CVSS3: 7.8
50%
Средний
почти 3 года назад
oracle-oval логотип
ELSA-2023-12143

ELSA-2023-12143: sudo security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2023-0291

ELSA-2023-0291: sudo security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2023-0284

ELSA-2023-0284: sudo security update (IMPORTANT)

почти 3 года назад
oracle-oval логотип
ELSA-2023-0282

ELSA-2023-0282: sudo security update (IMPORTANT)

почти 3 года назад
fstec логотип
BDU:2023-00210

Уязвимость функции sudoedit программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии

CVSS3: 7.3
50%
Средний
почти 3 года назад
redos логотип
ROS-20230124-01

Уязвимость Sudo

CVSS3: 7.3
50%
Средний
почти 3 года назад

Уязвимостей на страницу