
CVE-2007-3149
https://notcve.org/view.php?id=CVE-2007-3149
11 Jun 2007 — sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo." sudo, cuando está enlazado con MIT Kerberos 5 (krb5), no comprueba correctamente... • http://secunia.com/advisories/26540 •

CVE-2006-0151
https://notcve.org/view.php?id=CVE-2006-0151
09 Jan 2006 — sudo 1.6.8 and other versions does not clear the PYTHONINSPECT environment variable, which allows limited local users to gain privileges via a Python script, a variant of CVE-2005-4158. • http://secunia.com/advisories/18358 •

CVE-2005-4158 – Sudo 1.6.x - Environment Variable Handling Security Bypass
https://notcve.org/view.php?id=CVE-2005-4158
11 Dec 2005 — Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script. • https://www.exploit-db.com/exploits/27056 •

CVE-2005-2959
https://notcve.org/view.php?id=CVE-2005-2959
25 Oct 2005 — Incomplete blacklist vulnerability in sudo 1.6.8 and earlier allows local users to gain privileges via the (1) SHELLOPTS and (2) PS4 environment variables before executing a bash script on behalf of another user, which are not cleared even though other variables are. • http://docs.info.apple.com/article.html?artnum=305214 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2005-1993
https://notcve.org/view.php?id=CVE-2005-1993
20 Jun 2005 — Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack. • http://docs.info.apple.com/article.html?artnum=302847 •

CVE-2005-1831
https://notcve.org/view.php?id=CVE-2005-1831
31 May 2005 — Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. NOTE: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catches SIGINT and returns an empty string for the password so I don't see how this could happen unless the user's actual password was empty. • http://archives.neohapsis.com/archives/bugtraq/2005-05/0349.html •

CVE-2005-1119
https://notcve.org/view.php?id=CVE-2005-1119
16 Apr 2005 — Sudo VISudo 1.6.8 and earlier allows local users to corrupt arbitrary files via a symlink attack on temporary files. • http://www.securityfocus.com/bid/13171 •

CVE-2004-1051
https://notcve.org/view.php?id=CVE-2004-1051
18 Nov 2004 — sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname. • http://lists.apple.com/archives/security-announce/2005/May/msg00001.html •

CVE-2004-1689 – SudoEdit 1.6.8 - Local Change Permission
https://notcve.org/view.php?id=CVE-2004-1689
16 Sep 2004 — sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit. • https://www.exploit-db.com/exploits/470 •

CVE-2002-0184 – Sudo 1.6.x - Password Prompt Heap Overflow
https://notcve.org/view.php?id=CVE-2002-0184
16 May 2002 — Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded. Desbordamiento del montón (heap) en sudo anteriores a 1.6.6 puede permitir a usuarios locales ganar privilegios de root mediante caractéres especiales en el argumento -p (prompt), que no son expandidos adecuadamente. • https://www.exploit-db.com/exploits/21420 • CWE-131: Incorrect Calculation of Buffer Size •