Vulnerability Details : CVE-2013-2777
sudo before 1.7.10p5 and 1.8.x before 1.8.6p6, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to a session without a controlling terminal device and connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
Products affected by CVE-2013-2777
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:*:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.3.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-2777
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2777
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.4
|
MEDIUM | AV:L/AC:M/Au:N/C:P/I:P/A:P |
3.4
|
6.4
|
NIST |
CWE ids for CVE-2013-2777
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2777
-
http://rhn.redhat.com/errata/RHSA-2013-1701.html
RHSA-2013:1701 - Security Advisory - Red Hat Customer Portal
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701839
#701839 - sudo: CVE-2013-1776 potential bypass of sudo tty_tickets constraints - Debian Bug report logs
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/82453
Todd Miller sudo tty_tickets security bypass CVE-2013-2777 Vulnerability Report
-
https://support.apple.com/kb/HT205031
About the security content of OS X Yosemite v10.10.5 and Security Update 2015-006 - Apple SupportVendor Advisory
-
http://www.sudo.ws/repos/sudo/rev/2f3225a2a4a4
sudo: 2f3225a2a4a4Vendor Advisory
-
https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/87023
Bug #87023 “sudo option “tty_tickets” gives false sense of secur...” : Bugs : sudo package : Ubuntu
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
The Slackware Linux Project: Slackware Security Advisories
-
http://www.debian.org/security/2013/dsa-2642
Debian -- Security Information -- DSA-2642-1 sudo
-
http://www.openwall.com/lists/oss-security/2013/02/27/31
oss-security - Re: CVE request: potential bypass of sudo tty_tickets constraints
-
http://www.sudo.ws/sudo/alerts/tty_tickets.html
Potential bypass of tty_tickets constraintsVendor Advisory
-
http://www.sudo.ws/repos/sudo/rev/bfa23f089bba
sudo: bfa23f089bbaVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=916365
916365 – (CVE-2013-1776) CVE-2013-1776 sudo: bypass of tty_tickets constraints
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
Apple - Lists.apple.com
-
http://www.securityfocus.com/bid/58207
Todd Miller Sudo CVE-2013-1776 Local Security Bypass Vulnerability
Jump to