Sudo Project

Sudo

23 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Warnung Medienbericht Exploit
  • EPSS 23.61%
  • Veröffentlicht 30.06.2025 00:00:00
  • Zuletzt bearbeitet 30.09.2025 13:30:30

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Exploit
  • EPSS 18.4%
  • Veröffentlicht 30.06.2025 00:00:00
  • Zuletzt bearbeitet 25.07.2025 15:15:26

Sudo before 1.9.17p1, when used with a sudoers file that specifies a host that is neither the current host nor ALL, allows listed users to execute commands on unintended machines.

  • EPSS 0.05%
  • Veröffentlicht 23.12.2023 23:15:07
  • Zuletzt bearbeitet 21.11.2024 08:45:13

A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even ...

Exploit
  • EPSS 0%
  • Veröffentlicht 22.12.2023 16:15:08
  • Zuletzt bearbeitet 21.11.2024 08:22:36

Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not res...

  • EPSS 0.1%
  • Veröffentlicht 16.03.2023 01:15:47
  • Zuletzt bearbeitet 21.11.2024 07:55:12

Sudo before 1.9.13 does not escape control characters in sudoreplay output.

  • EPSS 0.1%
  • Veröffentlicht 16.03.2023 01:15:47
  • Zuletzt bearbeitet 21.11.2024 07:55:12

Sudo before 1.9.13 does not escape control characters in log messages.

Exploit
  • EPSS 0.17%
  • Veröffentlicht 28.02.2023 18:15:10
  • Zuletzt bearbeitet 21.03.2025 21:15:34

Sudo before 1.9.13p2 has a double free in the per-command chroot feature.

Exploit
  • EPSS 50.16%
  • Veröffentlicht 18.01.2023 17:15:10
  • Zuletzt bearbeitet 04.04.2025 16:15:16

In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to proce...

  • EPSS 0.07%
  • Veröffentlicht 02.11.2022 14:15:16
  • Zuletzt bearbeitet 05.05.2025 14:15:27

Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by e...

Warnung Exploit
  • EPSS 92.26%
  • Veröffentlicht 26.01.2021 21:15:12
  • Zuletzt bearbeitet 03.04.2025 19:47:48

Sudo before 1.9.5p2 contains an off-by-one error that can result in a heap-based buffer overflow, which allows privilege escalation to root via "sudoedit -s" and a command-line argument that ends with a single backslash character.