First published: Tue May 29 2018(Updated: )
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo Project Sudo | >=1.6.8<=1.8.18 | |
ubuntu/sudo | <1.8.9 | 1.8.9 |
ubuntu/sudo | <1.8.18 | 1.8.18 |
ubuntu/sudo | <1.8.16-0ubuntu1.6 | 1.8.16-0ubuntu1.6 |
debian/sudo | 1.8.27-1+deb10u3 1.8.27-1+deb10u6 1.9.5p2-3+deb11u1 1.9.13p3-1+deb12u1 1.9.15p5-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2016-7076.
CVE-2016-7076 has a severity rating of 7.8 (high).
The affected software for CVE-2016-7076 includes sudo versions before 1.8.18p1.
This vulnerability can be exploited by a local user who is permitted to run an application via sudo with the noexec restriction.
Yes, there are known fixes for this vulnerability. Please refer to the references for more information.