Количество 14
Количество 14
GHSA-3r97-xp9v-83jf
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the compiler and processor architecture.

CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.

CVE-2022-43995
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains ...

SUSE-SU-2022:4280-1
Security update for sudo

SUSE-SU-2022:4240-1
Security update for sudo

SUSE-SU-2022:4077-1
Security update for sudo

SUSE-SU-2022:4001-1
Security update for sudo

SUSE-SU-2022:3938-1
Security update for sudo

SUSE-SU-2022:3886-1
Security update for sudo

BDU:2022-06664
Уязвимость реализации функции crypt() программы системного администрирования Sudo, позволяющая нарушителю вызвать отказ в обслуживании

ROS-20221121-01
Уязвимость sudo
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
GHSA-3r97-xp9v-83jf Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the compiler and processor architecture. | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture. | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад |
![]() | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад | |
CVE-2022-43995 Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains ... | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4280-1 Security update for sudo | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4240-1 Security update for sudo | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4077-1 Security update for sudo | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:4001-1 Security update for sudo | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3938-1 Security update for sudo | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2022:3886-1 Security update for sudo | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2022-06664 Уязвимость реализации функции crypt() программы системного администрирования Sudo, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад |
![]() | ROS-20221121-01 Уязвимость sudo | CVSS3: 7.1 | 0% Низкий | больше 2 лет назад |
Уязвимостей на страницу