Lucene search

K
ubuntuUbuntuUSN-5811-2
HistoryJan 18, 2023 - 12:00 a.m.

Sudo vulnerability

2023-01-1800:00:00
ubuntu.com
52
sudo
ubuntu 16.04 esm
vulnerability
local attacker
arbitrary files

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.7%

Releases

  • Ubuntu 16.04 ESM

Packages

  • sudo - Provide limited super user privileges to specific users

Details

USN-5811-1 fixed a vulnerability in Sudo. This update provides
the corresponding update for Ubuntu 16.04 ESM.

Original advisory details:

Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)

OSVersionArchitecturePackageVersionFilename
Ubuntu16.04noarchsudo-ldap< 1.8.16-0ubuntu1.10+esm1UNKNOWN
Ubuntu16.04noarchsudo< 1.8.16-0ubuntu1.10UNKNOWN
Ubuntu16.04noarchsudo-dbgsym< 1.8.16-0ubuntu1.10UNKNOWN
Ubuntu16.04noarchsudo-ldap< 1.8.16-0ubuntu1.10UNKNOWN
Ubuntu16.04noarchsudo-ldap-dbgsym< 1.8.16-0ubuntu1.10UNKNOWN
Ubuntu16.04noarchsudo< 1.8.16-0ubuntu1.10+esm1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

19.7%