Use of Externally-Controlled Format String Affecting sudo package, versions <1.8.3p2-1
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
Exploit Maturity
Mature
EPSS
0.06% (26th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-SUDO-406998
- published 1 Feb 2012
- disclosed 1 Feb 2012
Introduced: 1 Feb 2012
CVE-2012-0809 Open this link in a new tabHow to fix?
Upgrade Debian:10
sudo
to version 1.8.3p2-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream sudo
package and not the sudo
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
References
- https://security-tracker.debian.org/tracker/CVE-2012-0809
- http://security.gentoo.org/glsa/glsa-201203-06.xml
- http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html
- http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_sudo.txt
- http://www.sudo.ws/sudo/alerts/sudo_debug.html
- https://www.exploit-db.com/exploits/25134