6.2
CVSSv2

CVE-2010-2956

Published: 10/09/2010 Updated: 10/10/2018
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 552
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Sudo 1.7.0 up to and including 1.7.4p3, when a Runas group is configured, does not properly handle use of the -u option in conjunction with the -g option, which allows local users to gain privileges via a command line containing a "-u root" sequence.

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.7.2p5

todd miller sudo 1.7.0

todd miller sudo 1.7.2p6

todd miller sudo 1.7.2

todd miller sudo 1.7.2p1

todd miller sudo 1.7.4p1

todd miller sudo 1.7.4

todd miller sudo 1.7.2p3

todd miller sudo 1.7.3b1

todd miller sudo 1.7.2p7

todd miller sudo 1.7.4p3

todd miller sudo 1.7.4p2

todd miller sudo 1.7.2p2

todd miller sudo 1.7.2p4

todd miller sudo 1.7.1

Vendor Advisories

Synopsis Important: sudo security update Type/Severity Security Advisory: Important Topic An updated sudo package that fixes one security issue is now available forRed Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact A Common Vulnerability S ...
Debian Bug report logs - #595935 CVE-2010-1646: Flaw in Runas group matching Package: sudo; Maintainer for sudo is Bdale Garbee <bdale@gagcom>; Source for sudo is src:sudo (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <muehlenhoff@univentionde> Date: Tue, 7 Sep 2010 12:39:01 UTC Severity: grave Tags: secu ...
Under non-default configurations, a local user could run programs with administrator privileges ...