CVE-2016-7076
6.4MEDIUMsudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user perm
Published: 5/29/2018Updated: 11/21/2024
Description
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
AI AnalysisPowered by AI
Affected Products
sudo_projectsudo
References
- http://rhn.redhat.com/errata/RHSA-2016-2872.htmlThird Party Advisory
- http://www.securityfocus.com/bid/95778Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076Issue Tracking
- https://security.netapp.com/advisory/ntap-20181127-0002/
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-3/
- https://www.sudo.ws/alerts/noexec_wordexp.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2872.htmlThird Party Advisory
- http://www.securityfocus.com/bid/95778Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076Issue Tracking
- https://security.netapp.com/advisory/ntap-20181127-0002/
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-3/
- https://www.sudo.ws/alerts/noexec_wordexp.htmlThird Party Advisory