4.4
CVSSv2

CVE-2011-0010

Published: 18/01/2011 Updated: 05/01/2018
CVSS v2 Base Score: 4.4 | Impact Score: 6.4 | Exploitability Score: 3.4
VMScore: 392
Vector: AV:L/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

check.c in sudo 1.7.x prior to 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.7.0

todd miller sudo 1.7.2p5

todd miller sudo 1.7.4p4

todd miller sudo 1.7.2

todd miller sudo 1.7.3b1

todd miller sudo 1.7.2p7

todd miller sudo 1.7.4p2

todd miller sudo 1.7.2p1

todd miller sudo 1.7.2p6

todd miller sudo 1.7.4p3

todd miller sudo 1.7.4

todd miller sudo 1.7.4p1

todd miller sudo 1.7.2p2

todd miller sudo 1.7.2p3

todd miller sudo 1.7.1

todd miller sudo 1.7.2p4

Vendor Advisories

Synopsis Low: sudo security and bug fix update Type/Severity Security Advisory: Low Topic An updated sudo package that fixes one security issue and various bugs isnow available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having lowsecurity impact A Common Vuln ...
Debian Bug report logs - #609641 sudo doesn't ask for password when only the GID is changed Package: sudo; Maintainer for sudo is Bdale Garbee <bdale@gagcom>; Source for sudo is src:sudo (PTS, buildd, popcon) Reported by: Alexander Kurtz <kurtzalex@googlemailcom> Date: Tue, 11 Jan 2011 07:15:05 UTC Severity: impo ...
Under certain circumstances, sudo could be made to run programs without a password ...

References

CWE-264http://www.sudo.ws/sudo/alerts/runas_group_pw.htmlhttp://www.vupen.com/english/advisories/2011/0089http://openwall.com/lists/oss-security/2011/01/12/3https://bugzilla.redhat.com/show_bug.cgi?id=668879http://www.osvdb.org/70400http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641http://www.securityfocus.com/bid/45774http://openwall.com/lists/oss-security/2011/01/12/1http://www.sudo.ws/repos/sudo/rev/07d1b0ce530ehttp://secunia.com/advisories/42886http://openwall.com/lists/oss-security/2011/01/11/3http://www.sudo.ws/repos/sudo/rev/fe8a94f96542http://secunia.com/advisories/42949http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:018http://secunia.com/advisories/42968http://www.ubuntu.com/usn/USN-1046-1http://www.vupen.com/english/advisories/2011/0182http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.htmlhttp://www.vupen.com/english/advisories/2011/0199http://www.vupen.com/english/advisories/2011/0195http://www.vupen.com/english/advisories/2011/0362http://secunia.com/advisories/43282http://www.vupen.com/english/advisories/2011/0212http://secunia.com/advisories/43068http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlhttp://www.redhat.com/support/errata/RHSA-2011-0599.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/64636http://security.gentoo.org/glsa/glsa-201203-06.xmlhttps://access.redhat.com/errata/RHSA-2012:0309https://usn.ubuntu.com/1046-1/https://nvd.nist.gov