CVE-2016-7076
6.4MEDIUMsudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user perm
Publicado: 5/29/2018Actualizado: 11/21/2024
Descripción
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
Análisis IAImpulsado por IA
Productos Afectados
sudo_projectsudo
Referencias
- http://rhn.redhat.com/errata/RHSA-2016-2872.htmlThird Party Advisory
- http://www.securityfocus.com/bid/95778Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076Issue Tracking
- https://security.netapp.com/advisory/ntap-20181127-0002/
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-3/
- https://www.sudo.ws/alerts/noexec_wordexp.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2016-2872.htmlThird Party Advisory
- http://www.securityfocus.com/bid/95778Third Party AdvisoryVDB Entry
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076Issue Tracking
- https://security.netapp.com/advisory/ntap-20181127-0002/
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-3/
- https://www.sudo.ws/alerts/noexec_wordexp.htmlThird Party Advisory