7.2
CVSSv2

CVE-2002-0043

Published: 31/01/2002 Updated: 03/05/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

sudo 1.6.0 up to and including 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.6

todd miller sudo 1.6.3_p4

todd miller sudo 1.6.3_p5

todd miller sudo 1.6.1

todd miller sudo 1.6.2

todd miller sudo 1.6.3_p6

todd miller sudo 1.6.3_p7

todd miller sudo 1.6.3_p2

todd miller sudo 1.6.3_p3

todd miller sudo 1.6.3

todd miller sudo 1.6.3_p1

Vendor Advisories

Sebastian Krahmer from SuSE found a vulnerability in sudo which could easily lead into a local root exploit This problem has been fixed in upstream version 164 as well as in version 162p2-21 for the stable release of Debian GNU/Linux We recommend that you upgrade your sudo packages immediately ...

Exploits

source: wwwsecurityfocuscom/bid/3871/info Sudo is a freely available, open source permissions management software package available for the Linux and Unix operating systems It is maintained by Todd C Miller Under some circumstances, sudo does not properly sanitize the environment it executes programs with In the event that sudo is us ...