CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
10.1%
It was discovered that sudo did not properly validate the path for the
βsudoeditβ pseudo-command. A local attacker could exploit this to execute
arbitrary code as root if sudo was configured to allow the attacker to use
sudoedit. The sudoedit pseudo-command is not used in the default
installation of Ubuntu. (CVE-2010-0426)
It was discovered that sudo did not reset group permissions when the
βrunas_defaultβ configuration option was used. A local attacker could
exploit this to escalate group privileges if sudo was configured to allow
the attacker to run commands under the runas_default account. The
runas_default configuration option is not used in the default installation
of Ubuntu. This issue affected Ubuntu 8.04 LTS, 8.10 and 9.04.
(CVE-2010-0427)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 9.10 | noarch | sudo-ldap | <Β 1.7.0-1ubuntu2.1 | UNKNOWN |
Ubuntu | 9.10 | noarch | sudo | <Β 1.7.0-1ubuntu2.1 | UNKNOWN |
Ubuntu | 9.04 | noarch | sudo-ldap | <Β 1.6.9p17-1ubuntu3.1 | UNKNOWN |
Ubuntu | 9.04 | noarch | sudo | <Β 1.6.9p17-1ubuntu3.1 | UNKNOWN |
Ubuntu | 9.04 | noarch | sudo | <Β ldap-1.6.9p17-1ubuntu3.1 | UNKNOWN |
Ubuntu | 8.10 | noarch | sudo-ldap | <Β 1.6.9p17-1ubuntu2.2 | UNKNOWN |
Ubuntu | 8.10 | noarch | sudo | <Β 1.6.9p17-1ubuntu2.2 | UNKNOWN |
Ubuntu | 8.10 | noarch | sudo | <Β ldap-1.6.9p17-1ubuntu2.2 | UNKNOWN |
Ubuntu | 8.04 | noarch | sudo-ldap | <Β 1.6.9p10-1ubuntu3.6 | UNKNOWN |
Ubuntu | 8.04 | noarch | sudo | <Β 1.6.9p10-1ubuntu3.6 | UNKNOWN |