[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS-2017-780 ---- sudo

ID: oval:org.secpod.oval:def:1600489Date: (C)2017-01-05   (M)2023-12-20
Class: PATCHFamily: unix




It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system or popen C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use this flaw to execute arbitrary commands with elevated privileges. It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed wordexp C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges

Platform:
Amazon Linux AMI
Product:
sudo
Reference:
ALAS-2017-780
CVE-2016-7032
CVE-2016-7076
CVE    2
CVE-2016-7032
CVE-2016-7076
CPE    2
cpe:/o:amazon:linux
cpe:/a:todd_miller:sudo

© SecPod Technologies