Permissions, Privileges, and Access Controls in Sudo



Published: 2015-11-17 | Updated: 2020-07-28
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2015-5602
CWE-ID CWE-264
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
Sudo
Client/Desktop applications / Software for system administration

Vendor Sudo

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU32397

Risk: Low

CVSSv3.1:

CVE-ID: CVE-2015-5602

CWE-ID:

Exploit availability:

Description

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

Mitigation

Install update from vendor's website.

Vulnerable software versions

Sudo: 1.8.0 - 1.8.14p3

Fixed software versions

CPE2.3 External links

http://bugzilla.sudo.ws/show_bug.cgi?id=707
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html
http://www.debian.org/security/2016/dsa-3440
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1034392
http://www.sudo.ws/stable.html#1.8.15
http://security.gentoo.org/glsa/201606-13
http://www.exploit-db.com/exploits/37710/


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?



###SIDEBAR###