Unknown
CVE-2011-0008
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command. NOTE: this vulnerability exists because of a CVE-2009-0034 regression.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- sudo,
- sudo 1.3.1,
- sudo 1.5,
- sudo 1.5.2,
- sudo 1.5.3,
- sudo 1.5.6,
- sudo 1.5.7,
- sudo 1.5.8,
- sudo 1.5.9,
- sudo 1.6,
- sudo 1.6.1,
- sudo 1.6.2,
- sudo 1.6.2p1,
- sudo 1.6.2p2,
- sudo 1.6.2p3,
- sudo 1.6.3,
- sudo 1.6.3 p1,
- sudo 1.6.3 p2,
- sudo 1.6.3 p3,
- sudo 1.6.3 p4,
- sudo 1.6.3 p5,
- sudo 1.6.3 p6,
- sudo 1.6.3 p7,
- sudo 1.6.3p1,
- sudo 1.6.3p2,
- sudo 1.6.3p3,
- sudo 1.6.3p4,
- sudo 1.6.3p5,
- sudo 1.6.3p6,
- sudo 1.6.3p7,
- sudo 1.6.4,
- sudo 1.6.4 p1,
- sudo 1.6.4 p2,
- sudo 1.6.4p1,
- sudo 1.6.4p2,
- sudo 1.6.5,
- sudo 1.6.5 p1,
- sudo 1.6.5 p2,
- sudo 1.6.5p1,
- sudo 1.6.5p2,
- sudo 1.6.6,
- sudo 1.6.7,
- sudo 1.6.7 p5,
- sudo 1.6.7p1,
- sudo 1.6.7p2,
- sudo 1.6.7p3,
- sudo 1.6.7p4,
- sudo 1.6.7p5,
- sudo 1.6.8,
- sudo 1.6.8 p1,
- sudo 1.6.8 p12,
- sudo 1.6.8 p2,
- sudo 1.6.8 p5,
- sudo 1.6.8 p7,
- sudo 1.6.8 p8,
- sudo 1.6.8 p9,
- sudo 1.6.8p1,
- sudo 1.6.8p10,
- sudo 1.6.8p11,
- sudo 1.6.8p12,
- sudo 1.6.8p2,
- sudo 1.6.8p3,
- sudo 1.6.8p4,
- sudo 1.6.8p5,
- sudo 1.6.8p6,
- sudo 1.6.8p7,
- sudo 1.6.8p8,
- sudo 1.6.8p9,
- sudo 1.6.9,
- sudo 1.6.9 p17,
- sudo 1.6.9 p18,
- sudo 1.6.9 p19,
- sudo 1.6.9 p20,
- sudo 1.6.9 p21,
- sudo 1.6.9 p22,
- sudo 1.6.9p1,
- sudo 1.6.9p10,
- sudo 1.6.9p11,
- sudo 1.6.9p12,
- sudo 1.6.9p13,
- sudo 1.6.9p14,
- sudo 1.6.9p15,
- sudo 1.6.9p16,
- sudo 1.6.9p17,
- sudo 1.6.9p18,
- sudo 1.6.9p19,
- sudo 1.6.9p2,
- sudo 1.6.9p20,
- sudo 1.6.9p21,
- sudo 1.6.9p22,
- sudo 1.6.9p23,
- sudo 1.6.9p3,
- sudo 1.6.9p4,
- sudo 1.6.9p5,
- sudo 1.6.9p6,
- sudo 1.6.9p7,
- sudo 1.6.9p8,
- sudo 1.6.9p9,
- sudo 1.7.0,
- sudo 1.7.1,
- sudo 1.7.2,
- sudo 1.7.2p1,
- sudo 1.7.2p2,
- sudo 1.7.2p3,
- sudo 1.7.2p4,
- sudo 1.7.2p5,
- sudo 1.7.2p6,
- sudo 1.7.2p7,
- sudo 1.7.3b1,
- sudo 1.7.4,
- sudo 1.7.4p1,
- sudo 1.7.4p2,
- sudo 1.7.4p3,
- sudo 1.7.4p4
References
Advisory
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: