Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2011-0008

Disclosure Date: January 20, 2011
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A certain Fedora patch for parse.c in sudo before 1.7.4p5-1.fc14 on Fedora 14 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command. NOTE: this vulnerability exists because of a CVE-2009-0034 regression.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • todd miller

Products

  • sudo,
  • sudo 1.3.1,
  • sudo 1.5,
  • sudo 1.5.2,
  • sudo 1.5.3,
  • sudo 1.5.6,
  • sudo 1.5.7,
  • sudo 1.5.8,
  • sudo 1.5.9,
  • sudo 1.6,
  • sudo 1.6.1,
  • sudo 1.6.2,
  • sudo 1.6.2p1,
  • sudo 1.6.2p2,
  • sudo 1.6.2p3,
  • sudo 1.6.3,
  • sudo 1.6.3 p1,
  • sudo 1.6.3 p2,
  • sudo 1.6.3 p3,
  • sudo 1.6.3 p4,
  • sudo 1.6.3 p5,
  • sudo 1.6.3 p6,
  • sudo 1.6.3 p7,
  • sudo 1.6.3p1,
  • sudo 1.6.3p2,
  • sudo 1.6.3p3,
  • sudo 1.6.3p4,
  • sudo 1.6.3p5,
  • sudo 1.6.3p6,
  • sudo 1.6.3p7,
  • sudo 1.6.4,
  • sudo 1.6.4 p1,
  • sudo 1.6.4 p2,
  • sudo 1.6.4p1,
  • sudo 1.6.4p2,
  • sudo 1.6.5,
  • sudo 1.6.5 p1,
  • sudo 1.6.5 p2,
  • sudo 1.6.5p1,
  • sudo 1.6.5p2,
  • sudo 1.6.6,
  • sudo 1.6.7,
  • sudo 1.6.7 p5,
  • sudo 1.6.7p1,
  • sudo 1.6.7p2,
  • sudo 1.6.7p3,
  • sudo 1.6.7p4,
  • sudo 1.6.7p5,
  • sudo 1.6.8,
  • sudo 1.6.8 p1,
  • sudo 1.6.8 p12,
  • sudo 1.6.8 p2,
  • sudo 1.6.8 p5,
  • sudo 1.6.8 p7,
  • sudo 1.6.8 p8,
  • sudo 1.6.8 p9,
  • sudo 1.6.8p1,
  • sudo 1.6.8p10,
  • sudo 1.6.8p11,
  • sudo 1.6.8p12,
  • sudo 1.6.8p2,
  • sudo 1.6.8p3,
  • sudo 1.6.8p4,
  • sudo 1.6.8p5,
  • sudo 1.6.8p6,
  • sudo 1.6.8p7,
  • sudo 1.6.8p8,
  • sudo 1.6.8p9,
  • sudo 1.6.9,
  • sudo 1.6.9 p17,
  • sudo 1.6.9 p18,
  • sudo 1.6.9 p19,
  • sudo 1.6.9 p20,
  • sudo 1.6.9 p21,
  • sudo 1.6.9 p22,
  • sudo 1.6.9p1,
  • sudo 1.6.9p10,
  • sudo 1.6.9p11,
  • sudo 1.6.9p12,
  • sudo 1.6.9p13,
  • sudo 1.6.9p14,
  • sudo 1.6.9p15,
  • sudo 1.6.9p16,
  • sudo 1.6.9p17,
  • sudo 1.6.9p18,
  • sudo 1.6.9p19,
  • sudo 1.6.9p2,
  • sudo 1.6.9p20,
  • sudo 1.6.9p21,
  • sudo 1.6.9p22,
  • sudo 1.6.9p23,
  • sudo 1.6.9p3,
  • sudo 1.6.9p4,
  • sudo 1.6.9p5,
  • sudo 1.6.9p6,
  • sudo 1.6.9p7,
  • sudo 1.6.9p8,
  • sudo 1.6.9p9,
  • sudo 1.7.0,
  • sudo 1.7.1,
  • sudo 1.7.2,
  • sudo 1.7.2p1,
  • sudo 1.7.2p2,
  • sudo 1.7.2p3,
  • sudo 1.7.2p4,
  • sudo 1.7.2p5,
  • sudo 1.7.2p6,
  • sudo 1.7.2p7,
  • sudo 1.7.3b1,
  • sudo 1.7.4,
  • sudo 1.7.4p1,
  • sudo 1.7.4p2,
  • sudo 1.7.4p3,
  • sudo 1.7.4p4
Technical Analysis