First published: Mon Mar 04 2013(Updated: )
sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Todd Miller Sudo | =1.6 | |
Todd Miller Sudo | =1.6.1 | |
Todd Miller Sudo | =1.6.2 | |
Todd Miller Sudo | =1.6.2p3 | |
Todd Miller Sudo | =1.6.3 | |
Todd Miller Sudo | =1.6.3_p7 | |
Todd Miller Sudo | =1.6.4 | |
Todd Miller Sudo | =1.6.4p2 | |
Todd Miller Sudo | =1.6.5 | |
Todd Miller Sudo | =1.6.6 | |
Todd Miller Sudo | =1.6.7 | |
Todd Miller Sudo | =1.6.7p5 | |
Todd Miller Sudo | =1.6.8 | |
Todd Miller Sudo | =1.6.8p12 | |
Todd Miller Sudo | =1.6.9 | |
Todd Miller Sudo | =1.6.9p20 | |
Todd Miller Sudo | =1.6.9p21 | |
Todd Miller Sudo | =1.6.9p22 | |
Todd Miller Sudo | =1.6.9p23 | |
Todd Miller Sudo | =1.8.0 | |
Todd Miller Sudo | =1.8.1 | |
Todd Miller Sudo | =1.8.1p1 | |
Todd Miller Sudo | =1.8.1p2 | |
Todd Miller Sudo | =1.8.2 | |
Todd Miller Sudo | =1.8.3 | |
Todd Miller Sudo | =1.8.3p1 | |
Todd Miller Sudo | =1.8.3p2 | |
Todd Miller Sudo | =1.8.4 | |
Todd Miller Sudo | =1.8.4p1 | |
Todd Miller Sudo | =1.8.4p2 | |
Todd Miller Sudo | =1.8.4p3 | |
Todd Miller Sudo | =1.8.4p4 | |
Todd Miller Sudo | =1.8.4p5 | |
Todd Miller Sudo | =1.8.5 | |
Todd Miller Sudo | =1.8.5p1 | |
Todd Miller Sudo | =1.8.5p2 | |
Todd Miller Sudo | =1.8.5p3 | |
Todd Miller Sudo | =1.8.6 | |
Todd Miller Sudo | =1.8.6p1 | |
Todd Miller Sudo | =1.8.6p2 | |
Todd Miller Sudo | =1.8.6p3 | |
Todd Miller Sudo | =1.8.6p4 | |
Todd Miller Sudo | =1.8.6p5 | |
Todd Miller Sudo | =1.8.6p6 | |
Apple Mac OS X | <=10.10.4 | |
Todd Miller Sudo | =1.7.0 | |
Todd Miller Sudo | =1.7.1 | |
Todd Miller Sudo | =1.7.2 | |
Todd Miller Sudo | =1.7.2p1 | |
Todd Miller Sudo | =1.7.2p2 | |
Todd Miller Sudo | =1.7.2p3 | |
Todd Miller Sudo | =1.7.2p4 | |
Todd Miller Sudo | =1.7.2p5 | |
Todd Miller Sudo | =1.7.2p6 | |
Todd Miller Sudo | =1.7.2p7 | |
Todd Miller Sudo | =1.7.3b1 | |
Todd Miller Sudo | =1.7.4 | |
Todd Miller Sudo | =1.7.4p1 | |
Todd Miller Sudo | =1.7.4p2 | |
Todd Miller Sudo | =1.7.4p3 | |
Todd Miller Sudo | =1.7.4p4 | |
Todd Miller Sudo | =1.7.4p5 | |
Todd Miller Sudo | =1.7.4p6 | |
Todd Miller Sudo | =1.7.5 | |
Todd Miller Sudo | =1.7.6 | |
Todd Miller Sudo | =1.7.6p1 | |
Todd Miller Sudo | =1.7.6p2 | |
Todd Miller Sudo | =1.7.7 | |
Todd Miller Sudo | =1.7.8 | |
Todd Miller Sudo | =1.7.8p1 | |
Todd Miller Sudo | =1.7.8p2 | |
Todd Miller Sudo | =1.7.9 | |
Todd Miller Sudo | =1.7.9p1 | |
Todd Miller Sudo | =1.7.10 | |
Todd Miller Sudo | =1.7.10p1 | |
Todd Miller Sudo | =1.7.10p2 | |
Todd Miller Sudo | =1.7.10p3 | |
Todd Miller Sudo | =1.7.10p4 | |
Todd Miller Sudo | =1.7.10p5 | |
Todd Miller Sudo | =1.7.10p6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.