ALAS-2017-780 ---- sudoID: oval:org.secpod.oval:def:1600489 | Date: (C)2017-01-05 (M)2023-12-20 |
Class: PATCH | Family: unix |
It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system or popen C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use this flaw to execute arbitrary commands with elevated privileges. It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed wordexp C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges
Platform: |
Amazon Linux AMI |