First published: Thu Jan 31 2002(Updated: )
sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | =1.6.3_p6 | |
Sudo | =1.6.3 | |
Sudo | =1.6.1 | |
Sudo | =1.6.3_p5 | |
Sudo | =1.6.2 | |
Sudo | =1.6.3_p2 | |
Sudo | =1.6.3_p4 | |
Sudo | =1.6.3_p3 | |
Sudo | =1.6.3_p7 | |
Sudo | =1.6 | |
Sudo | =1.6.3_p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0043 has a high severity rating due to its potential to allow local users to gain root privileges.
To fix CVE-2002-0043, update to a patched version of sudo that is higher than 1.6.3p7.
CVE-2002-0043 affects sudo versions from 1.6.0 to 1.6.3p7.
No, CVE-2002-0043 can only be exploited by local users who have access to the system.
CVE-2002-0043 poses a significant security risk as it could allow unauthorized users to execute commands with root privileges.