6.9
CVSSv2

CVE-2013-1775

Published: 05/03/2013 Updated: 28/11/2016
CVSS v2 Base Score: 6.9 | Impact Score: 10 | Exploitability Score: 3.4
VMScore: 700
Vector: AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

sudo 1.6.0 up to and including 1.7.10p6 and sudo 1.8.0 up to and including 1.8.6p6 allows local users or physically proximate malicious users to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.6.9p21

todd miller sudo 1.6.7p5

todd miller sudo 1.6.1

todd miller sudo 1.6.6

todd miller sudo 1.6.9p22

todd miller sudo 1.6.2p3

todd miller sudo 1.6.4

todd miller sudo 1.6.8p12

todd miller sudo 1.6.2

todd miller sudo 1.6.7

todd miller sudo 1.6.9p23

todd miller sudo 1.6.5

todd miller sudo 1.6.3_p7

todd miller sudo 1.6.9

todd miller sudo 1.6.3

todd miller sudo 1.6.4p2

todd miller sudo 1.6.9p20

todd miller sudo 1.6

todd miller sudo 1.6.8

todd miller sudo 1.8.1p2

todd miller sudo 1.8.2

todd miller sudo 1.8.4p3

todd miller sudo 1.8.4p4

todd miller sudo 1.8.6p1

todd miller sudo 1.8.6p2

todd miller sudo 1.8.3

todd miller sudo 1.8.3p1

todd miller sudo 1.8.4p5

todd miller sudo 1.8.5

todd miller sudo 1.8.6p3

todd miller sudo 1.8.6p4

todd miller sudo 1.8.3p2

todd miller sudo 1.8.4

todd miller sudo 1.8.5p1

todd miller sudo 1.8.5p2

todd miller sudo 1.8.6p5

todd miller sudo 1.8.6p6

todd miller sudo 1.8.0

todd miller sudo 1.8.1

todd miller sudo 1.8.1p1

todd miller sudo 1.8.4p1

todd miller sudo 1.8.4p2

todd miller sudo 1.8.5p3

todd miller sudo 1.8.6

apple mac os x

todd miller sudo 1.7.2p2

todd miller sudo 1.7.2p3

todd miller sudo 1.7.0

todd miller sudo 1.7.2p4

todd miller sudo 1.7.4p1

todd miller sudo 1.7.4p6

todd miller sudo 1.7.8p2

todd miller sudo 1.7.9

todd miller sudo 1.7.10p5

todd miller sudo 1.7.10p6

todd miller sudo 1.7.3b1

todd miller sudo 1.7.2

todd miller sudo 1.7.1

todd miller sudo 1.7.4p4

todd miller sudo 1.7.5

todd miller sudo 1.7.6

todd miller sudo 1.7.9p1

todd miller sudo 1.7.10

todd miller sudo 1.7.4p5

todd miller sudo 1.7.2p6

todd miller sudo 1.7.2p7

todd miller sudo 1.7.4p2

todd miller sudo 1.7.6p1

todd miller sudo 1.7.6p2

todd miller sudo 1.7.7

todd miller sudo 1.7.10p1

todd miller sudo 1.7.10p2

todd miller sudo 1.7.2p1

todd miller sudo 1.7.2p5

todd miller sudo 1.7.4p3

todd miller sudo 1.7.4

todd miller sudo 1.7.8

todd miller sudo 1.7.8p1

todd miller sudo 1.7.10p3

todd miller sudo 1.7.10p4

Vendor Advisories

Synopsis Low: sudo security and bug fix update Type/Severity Security Advisory: Low Topic An updated sudo package that fixes multiple security issues and severalbugs is now available for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having lowsecurity impact Common ...
Synopsis Low: sudo security, bug fix and enhancement update Type/Severity Security Advisory: Low Topic An updated sudo package that fixes two security issues, several bugs, andadds two enhancements is now available for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as ha ...
Debian Bug report logs - #701838 sudo: CVE-2013-1775 authentication bypass when clock is reset Package: sudo; Maintainer for sudo is Bdale Garbee <bdale@gagcom>; Source for sudo is src:sudo (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, 27 Feb 2013 20:12:01 UTC Severity: grave Tags: secu ...
Sudo could be made to run programs as the administrator without a password prompt ...
Several vulnerabilities have been discovered in sudo, a program designed to allow a sysadmin to give limited root privileges to users The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-1775 Marco Schoepl discovered an authentication bypass when the clock is set to the UNIX epoch [00:00:00 UTC on 1 ...
A flaw was found in the way sudo handled time stamp files An attacker able to run code as a local user and with the ability to control the system clock could possibly gain additional privileges by running commands that the victim user was allowed to run via sudo, without knowing the victim's password (CVE-2013-1775) It was found that sudo did not ...

Exploits

This Metasploit module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775 Tested working on Mac OS 107-1084, and possibly lower versions If your session belongs to a user with Administrative Privileges (the user is in the sudoers file and is in the "admin group"), and the user has ever run th ...
## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # web site for more information on licensing and terms of use # # metasploitcom/ ## require 'shellwords' class Metasploit3 < Msf::Exploit::Local # ManualRanking because it's going to modify ...
#!/usr/bin/python # Original MSF Module: # githubcom/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/sudo_password_bypassrb ################################################################################################### # Exploit Title: OSX <= 1084 Local Root Priv Escalation Root Reverse Shell # Date: 08-27- ...

Github Repositories

CVE-2013-1775 Exploit written in Perl

CVE-2013-1775 Apple Mac OSX 1084 - Privilege Escalation Perl version of CVE-2013-1775 Apple Mac OSX 1084 - Privelege Escalation exploit References: wwwexploit-dbcom/exploits/27965/ githubcom/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/sudo_password_bypassrb wwwexploit-dbcom/exploits/27944/