7.2
CVE-2012-0809
- EPSS 43.58%
- Published 01.02.2012 00:55:02
- Last modified 11.04.2025 00:51:21
- Source secalert@redhat.com
- Teams watchlist Login
- Open Login
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
Data is provided by the National Vulnerability Database (NVD)
Todd Miller ≫ Sudo Version1.8.0
Todd Miller ≫ Sudo Version1.8.1
Todd Miller ≫ Sudo Version1.8.1p1
Todd Miller ≫ Sudo Version1.8.1p2
Todd Miller ≫ Sudo Version1.8.2
Todd Miller ≫ Sudo Version1.8.3
Todd Miller ≫ Sudo Version1.8.3p1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 43.58% | 0.974 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.