Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2015-5602 |
CWE-ID | CWE-264 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
Sudo Client/Desktop applications / Software for system administration |
Vendor | Sudo |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU32397
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2015-5602
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a local non-authenticated attacker to execute arbitrary code.
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
MitigationInstall update from vendor's website.
Vulnerable software versionsSudo: 1.8.0 - 1.8.14p3
Fixed software versionsCPE2.3 External links
http://bugzilla.sudo.ws/show_bug.cgi?id=707
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html
http://www.debian.org/security/2016/dsa-3440
http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
http://www.securitytracker.com/id/1034392
http://www.sudo.ws/stable.html#1.8.15
http://security.gentoo.org/glsa/201606-13
http://www.exploit-db.com/exploits/37710/
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?