614
VMScore

CVE-2009-0034

Published: 30/01/2009 Updated: 12/01/2024
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 614
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

parse.c in sudo 1.6.9p17 up to and including 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

Vulnerable Product Search on Vulmon Subscribe to Product

gratisoft sudo 1.6.9

vmware esx 4.0

Vendor Advisories

Synopsis Moderate: sudo security update Type/Severity Security Advisory: Moderate Topic An updated sudo package to fix a security issue is now available for RedHat Enterprise Linux 5This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Harald Koenig discovered that sudo did not correctly handle certain privilege changes when handling groups If a local attacker belonged to a group included in a “RunAs” list in the /etc/sudoers file, that user could gain root privileges This was not an issue for the default sudoers file shipped with Ubuntu ...