Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2010-0426

Disclosure Date: February 24, 2010
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user’s home directory.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • todd miller

Products

  • sudo 1.6,
  • sudo 1.6.1,
  • sudo 1.6.2,
  • sudo 1.6.3,
  • sudo 1.6.3 p1,
  • sudo 1.6.3 p2,
  • sudo 1.6.3 p3,
  • sudo 1.6.3 p4,
  • sudo 1.6.3 p5,
  • sudo 1.6.3 p6,
  • sudo 1.6.3 p7,
  • sudo 1.6.4 p1,
  • sudo 1.6.4 p2,
  • sudo 1.6.5 p1,
  • sudo 1.6.5 p2,
  • sudo 1.6.7 p5,
  • sudo 1.6.8 p1,
  • sudo 1.6.8 p12,
  • sudo 1.6.8 p2,
  • sudo 1.6.8 p5,
  • sudo 1.6.8 p7,
  • sudo 1.6.8 p8,
  • sudo 1.6.8 p9,
  • sudo 1.6.9 p17,
  • sudo 1.6.9 p18,
  • sudo 1.6.9 p19,
  • sudo 1.7.0,
  • sudo 1.7.1,
  • sudo 1.7.2,
  • sudo 1.7.2p1,
  • sudo 1.7.2p2,
  • sudo 1.7.2p3

References

Additional Info

Technical Analysis