Vulnerability Details : CVE-2011-0010
check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command.
Products affected by CVE-2011-0010
- cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-0010
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 14 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-0010
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2011-0010
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0010
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593654
The Slackware Linux Project: Slackware Security Advisories
-
http://openwall.com/lists/oss-security/2011/01/12/3
oss-security - Re: CVE request: sudo does not ask for password on GID changes
-
http://www.sudo.ws/sudo/alerts/runas_group_pw.html
Flaw in Runas Group password checking
-
http://www.vupen.com/english/advisories/2011/0212
Webmail | OVH- OVH
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=609641
#609641 - sudo doesn't ask for password when only the GID is changed - Debian Bug report logs
-
http://www.sudo.ws/repos/sudo/rev/fe8a94f96542
sudo: fe8a94f96542Patch
-
http://www.redhat.com/support/errata/RHSA-2011-0599.html
Support
-
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2011:002
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053341.html
[SECURITY] Fedora 13 Update: sudo-1.7.4p5-1.fc13
-
http://openwall.com/lists/oss-security/2011/01/12/1
oss-security - Re: CVE request: sudo does not ask for password on GID changesPatch
-
http://www.vupen.com/english/advisories/2011/0199
Webmail | OVH- OVH
-
http://www.securityfocus.com/bid/45774
Todd Miller Sudo Group ID Change Security Vulnerability
-
http://www.ubuntu.com/usn/USN-1046-1
USN-1046-1: Sudo vulnerability | Ubuntu security notices
-
http://www.vupen.com/english/advisories/2011/0089
Webmail | OVH- OVHVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0195
Webmail | OVH- OVH
-
http://www.vupen.com/english/advisories/2011/0182
Webmail | OVH- OVH
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:018
mandriva.com
-
http://openwall.com/lists/oss-security/2011/01/11/3
oss-security - CVE request: sudo does not ask for password on GID changesPatch
-
https://bugzilla.redhat.com/show_bug.cgi?id=668879
668879 – (CVE-2011-0010) CVE-2011-0010 sudo: does not ask for password on GID changesPatch
-
http://www.vupen.com/english/advisories/2011/0362
Webmail | OVH- OVH
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053263.html
[SECURITY] Fedora 14 Update: sudo-1.7.4p5-1.fc14
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/64636
Sudo group ID privilege escalation CVE-2011-0010 Vulnerability Report
-
http://security.gentoo.org/glsa/glsa-201203-06.xml
sudo: Privilege escalation (GLSA 201203-06) — Gentoo security
-
http://www.sudo.ws/repos/sudo/rev/07d1b0ce530e
sudo: 07d1b0ce530ePatch
Jump to