7.2
CVSSv2

CVE-2002-0043

Published: 31/01/2002 Updated: 03/05/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

sudo 1.6.0 up to and including 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.6.3 p6

todd miller sudo 1.6.3

todd miller sudo 1.6.1

todd miller sudo 1.6.3 p5

todd miller sudo 1.6.2

todd miller sudo 1.6.3 p2

todd miller sudo 1.6.3 p4

todd miller sudo 1.6.3 p3

todd miller sudo 1.6.3 p7

todd miller sudo 1.6

todd miller sudo 1.6.3 p1

Vendor Advisories

Sebastian Krahmer from SuSE found a vulnerability in sudo which could easily lead into a local root exploit This problem has been fixed in upstream version 164 as well as in version 162p2-21 for the stable release of Debian GNU/Linux We recommend that you upgrade your sudo packages immediately ...

Exploits

source: wwwsecurityfocuscom/bid/3871/info Sudo is a freely available, open source permissions management software package available for the Linux and Unix operating systems It is maintained by Todd C Miller Under some circumstances, sudo does not properly sanitize the environment it executes programs with In the event that sudo is us ...