First published: Tue Nov 17 2015(Updated: )
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | <=1.8.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5602 is classified as a high severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2015-5602, upgrade Sudo to version 1.8.15 or later.
CVE-2015-5602 affects users of Sudo versions prior to 1.8.15 that have misconfigured sudoers files with wildcard paths.
A symlink attack in CVE-2015-5602 involves tricking the sudoedit command to operate on a file that a local attacker can manipulate due to inadequate path handling.
CVE-2015-5602 is a local vulnerability, as it requires local user access to exploit.