The command matching functionality in sudo 1.6.8 up to and including 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
todd miller sudo 1.6.8_p1 |
||
todd miller sudo 1.6.8_p12 |
||
todd miller sudo 1.6.9_p17 |
||
todd miller sudo 1.6.9_p18 |
||
todd miller sudo 1.7.2p4 |
||
todd miller sudo 1.7.0 |
||
todd miller sudo 1.6.8 |
||
todd miller sudo 1.6.8_p9 |
||
todd miller sudo 1.6.8p7 |
||
todd miller sudo 1.7.2p2 |
||
todd miller sudo 1.7.2p3 |
||
todd miller sudo 1.6.8_p2 |
||
todd miller sudo 1.6.8_p5 |
||
todd miller sudo 1.6.9_p19 |
||
todd miller sudo 1.6.9_p20 |
||
todd miller sudo 1.6.9_p21 |
||
todd miller sudo 1.7.1 |
||
todd miller sudo 1.6.8_p7 |
||
todd miller sudo 1.6.8_p8 |
||
todd miller sudo 1.6.9_p22 |
||
todd miller sudo 1.7.2p1 |