Количество 14
Количество 14
BDU:2022-06664
Уязвимость реализации функции crypt() программы системного администрирования Sudo, позволяющая нарушителю вызвать отказ в обслуживании
ROS-20221121-01
Уязвимость sudo
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
CVE-2022-43995
Sudo 1.8.0 through 1.9.12 with the crypt() password backend contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries compiler and processor architecture.
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains ...
SUSE-SU-2022:4280-1
Security update for sudo
SUSE-SU-2022:4240-1
Security update for sudo
SUSE-SU-2022:4077-1
Security update for sudo
SUSE-SU-2022:4001-1
Security update for sudo
SUSE-SU-2022:3938-1
Security update for sudo
SUSE-SU-2022:3886-1
Security update for sudo
GHSA-3r97-xp9v-83jf
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the compiler and processor architecture.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2022-06664 Уязвимость реализации функции crypt() программы системного администрирования Sudo, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
ROS-20221121-01 Уязвимость sudo | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
CVE-2022-43995 Sudo 1.8.0 through 1.9.12 with the crypt() password backend contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries compiler and processor architecture. | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains ... | CVSS3: 7.1 | 0% Низкий | около 3 лет назад | |
SUSE-SU-2022:4280-1 Security update for sudo | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4240-1 Security update for sudo | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4077-1 Security update for sudo | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:4001-1 Security update for sudo | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:3938-1 Security update for sudo | 0% Низкий | около 3 лет назад | ||
SUSE-SU-2022:3886-1 Security update for sudo | 0% Низкий | около 3 лет назад | ||
GHSA-3r97-xp9v-83jf Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the compiler and processor architecture. | CVSS3: 7.1 | 0% Низкий | около 3 лет назад |
Уязвимостей на страницу