CWE
264
Advisory Published
Updated

CVE-2013-2776

First published: Mon Apr 08 2013(Updated: )

sudo 1.3.5 through 1.7.10p5 and 1.8.0 through 1.8.6p6, when running on systems without /proc or the sysctl function with the tty_tickets option enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Todd Miller Sudo=1.3.5
Todd Miller Sudo=1.6
Todd Miller Sudo=1.6.1
Todd Miller Sudo=1.6.2
Todd Miller Sudo=1.6.2p3
Todd Miller Sudo=1.6.3
Todd Miller Sudo=1.6.3_p7
Todd Miller Sudo=1.6.4
Todd Miller Sudo=1.6.4p2
Todd Miller Sudo=1.6.5
Todd Miller Sudo=1.6.6
Todd Miller Sudo=1.6.7
Todd Miller Sudo=1.6.7p5
Todd Miller Sudo=1.6.8
Todd Miller Sudo=1.6.8p12
Todd Miller Sudo=1.6.9
Todd Miller Sudo=1.6.9p20
Todd Miller Sudo=1.6.9p21
Todd Miller Sudo=1.6.9p22
Todd Miller Sudo=1.6.9p23
Todd Miller Sudo=1.7.0
Todd Miller Sudo=1.7.1
Todd Miller Sudo=1.7.2
Todd Miller Sudo=1.7.2p1
Todd Miller Sudo=1.7.2p2
Todd Miller Sudo=1.7.2p3
Todd Miller Sudo=1.7.2p4
Todd Miller Sudo=1.7.2p5
Todd Miller Sudo=1.7.2p6
Todd Miller Sudo=1.7.2p7
Todd Miller Sudo=1.7.3b1
Todd Miller Sudo=1.7.4
Todd Miller Sudo=1.7.4p1
Todd Miller Sudo=1.7.4p2
Todd Miller Sudo=1.7.4p3
Todd Miller Sudo=1.7.4p4
Todd Miller Sudo=1.7.4p5
Todd Miller Sudo=1.7.4p6
Todd Miller Sudo=1.7.5
Todd Miller Sudo=1.7.6
Todd Miller Sudo=1.7.6p1
Todd Miller Sudo=1.7.6p2
Todd Miller Sudo=1.7.7
Todd Miller Sudo=1.7.8
Todd Miller Sudo=1.7.8p1
Todd Miller Sudo=1.7.8p2
Todd Miller Sudo=1.7.9
Todd Miller Sudo=1.7.9p1
Todd Miller Sudo=1.7.10
Todd Miller Sudo=1.7.10p1
Todd Miller Sudo=1.7.10p2
Todd Miller Sudo=1.7.10p3
Apple iOS and macOS<=10.10.4
Todd Miller Sudo=1.7.10p4
Todd Miller Sudo=1.7.10p5
Todd Miller Sudo=1.8.0
Todd Miller Sudo=1.8.1
Todd Miller Sudo=1.8.1p1
Todd Miller Sudo=1.8.1p2
Todd Miller Sudo=1.8.2
Todd Miller Sudo=1.8.3
Todd Miller Sudo=1.8.3p1
Todd Miller Sudo=1.8.3p2
Todd Miller Sudo=1.8.4
Todd Miller Sudo=1.8.4p1
Todd Miller Sudo=1.8.4p2
Todd Miller Sudo=1.8.4p3
Todd Miller Sudo=1.8.4p4
Todd Miller Sudo=1.8.4p5
Todd Miller Sudo=1.8.5
Todd Miller Sudo=1.8.6
Todd Miller Sudo=1.8.6p1
Todd Miller Sudo=1.8.6p2
Todd Miller Sudo=1.8.6p3
Todd Miller Sudo=1.8.6p4
Todd Miller Sudo=1.8.6p5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2013-2776?

    CVE-2013-2776 has a high severity rating due to its potential to allow local users to hijack sudo privileges from other users.

  • How do I fix CVE-2013-2776?

    To fix CVE-2013-2776, upgrade to sudo version 1.7.10p6 or later, or 1.8.7 or later, where the vulnerability is patched.

  • Who is affected by CVE-2013-2776?

    CVE-2013-2776 affects local users on systems running vulnerable versions of sudo without /proc or sysctl functionalities.

  • What are the vulnerable versions for CVE-2013-2776?

    The vulnerable versions for CVE-2013-2776 range from 1.3.5 to 1.8.6p6 of sudo.

  • Is CVE-2013-2776 fixed in all distributions?

    CVE-2013-2776 is not fixed in all distributions, and users should verify their specific sudo versions against the vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203