7.2
CVE-2012-0809
- EPSS 43.58%
- Veröffentlicht 01.02.2012 00:55:02
- Zuletzt bearbeitet 11.04.2025 00:51:21
- Quelle secalert@redhat.com
- Teams Watchlist Login
- Unerledigt Login
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Todd Miller ≫ Sudo Version1.8.0
Todd Miller ≫ Sudo Version1.8.1
Todd Miller ≫ Sudo Version1.8.1p1
Todd Miller ≫ Sudo Version1.8.1p2
Todd Miller ≫ Sudo Version1.8.2
Todd Miller ≫ Sudo Version1.8.3
Todd Miller ≫ Sudo Version1.8.3p1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 43.58% | 0.974 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
CWE-134 Use of Externally-Controlled Format String
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.