CVE-2002-0184

Current Description

Heap-based buffer overflow in sudo before 1.6.6 may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded.

Basic Data

PublishedMay 16, 2002
Last ModifiedOctober 18, 2016
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorLOCAL
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score7.2
SeverityHIGH
Exploitability Score3.9
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationTodd MillerSudo1.5.9*******
    2.3ApplicationTodd MillerSudo1.6*******
    2.3ApplicationTodd MillerSudo1.6.1*******
    2.3ApplicationTodd MillerSudo1.6.2*******
    2.3ApplicationTodd MillerSudo1.6.3*******
    2.3ApplicationTodd MillerSudo1.6.3p1*******
    2.3ApplicationTodd MillerSudo1.6.3p2*******
    2.3ApplicationTodd MillerSudo1.6.3p3*******
    2.3ApplicationTodd MillerSudo1.6.3p4*******
    2.3ApplicationTodd MillerSudo1.6.3p5*******
    2.3ApplicationTodd MillerSudo1.6.3p6*******
    2.3ApplicationTodd MillerSudo1.6.3p7*******
    2.3ApplicationTodd MillerSudo1.6.4*******
    2.3ApplicationTodd MillerSudo1.6.4p1*******
    2.3ApplicationTodd MillerSudo1.6.4p2*******
    2.3ApplicationTodd MillerSudo1.6.5*******
    2.3ApplicationTodd MillerSudo1.6.5p1*******
    2.3ApplicationTodd MillerSudo1.6.5p2*******

Vulnerable Software List

VendorProductVersions
Todd Miller Sudo 1.5.9, 1.6, 1.6.1, 1.6.2, 1.6.3, 1.6.3p1, 1.6.3p2, 1.6.3p3, 1.6.3p4, 1.6.3p5, 1.6.3p6, 1.6.3p7, 1.6.4, 1.6.4p1, 1.6.4p2, 1.6.5, 1.6.5p1, 1.6.5p2

References

NameSourceURLTags
CLA-2002:475http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000475CONECTIVA
20020425 [Global InterSec 2002041701] Sudo Password Prompthttp://marc.info/?l=bugtraq&m=101974610509912&w=2BUGTRAQ
20020425 Sudo version 1.6.6 now available (fwd)http://marc.info/?l=bugtraq&m=101975443619600&w=2BUGTRAQ
20020425 [slackware-security] sudo upgrade fixes a potential vulnerabilityhttp://marc.info/?l=bugtraq&m=101979472822196&w=2BUGTRAQ
20020429 TSLSA-2002-0046 - sudohttp://marc.info/?l=bugtraq&m=102010164413135&w=2BUGTRAQ
DSA-128http://www.debian.org/security/2002/dsa-128DEBIAN
sudo-password-expansion-overflow(8936)http://www.iss.net/security_center/static/8936.phpXF
VU#820083http://www.kb.cert.org/vuls/id/820083CERT-VNUS Government Resource
MDKSA-2002:028http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-028.php3MANDRAKE
ESA-20020429-010http://www.linuxsecurity.com/advisories/other_advisory-2040.htmlENGARDEPatch Vendor Advisory
SuSE-SA:2002:014http://www.novell.com/linux/security/advisories/2002_014_sudo_txt.htmlSUSE
RHSA-2002:071http://www.redhat.com/support/errata/RHSA-2002-071.htmlREDHAT
RHSA-2002:072http://www.redhat.com/support/errata/RHSA-2002-072.htmlREDHAT
4593http://www.securityfocus.com/bid/4593BID