CVE-2010-1163
Published Apr 16, 2010
Last updated 6 years ago
Overview
- Description
- The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.9
- Impact score
- 10
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6419309-385F-4525-AD4B-C73B1A3ED935" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51F7E821-2908-47F1-9665-E9D68ECC242F" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C90D0AB4-F8A8-4301-99B5-757254FA999A" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A79C7098-37D0-4E6E-A22C-3C771D81956F" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB7D2832-B654-406E-AA34-B3BD1D6F0A2A" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5688D95-89EF-4D2E-9728-2316CAC3CBE6" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B69E49B2-1B3C-4434-ACF1-CF4F519E3C32" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31B2C299-5D0B-44DA-91FD-4B1146BE9A7B" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B570E525-A024-4D41-9600-1134433786DF" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "471284F9-21EF-4ED6-860F-AB86154CCDF1" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C91FEB5-CEF5-4C66-A8D2-AE80EA32B10D" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E106EBA5-14B3-48F7-BE00-9F0ABD57C33B" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "215B0725-5314-49E6-8A96-2106860F4304" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E35B5C93-D197-4ADE-88F3-679311B083B1" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99854E9D-4D84-44D9-AB68-175A3048EA34" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "643ABD1F-83E1-4B71-AA59-8CF8B4018A46" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8967DE4C-3D41-4BCE-97B0-469FCFBCE332" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2C91B0A-44B6-4B33-A0ED-295C56D97546" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07945224-A955-4A33-B54B-11D128FCA0F6" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "41F70C45-9522-4F49-A5B9-62E03410F03E" }, { "criteria": "cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DEAE0BA2-D9AC-40A3-A4DC-1E33DEE7200C" } ], "operator": "OR" } ] } ]