// For flags

CVE-2009-0034

sudo: incorrect handling of groups in Runas_User

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

parse.c de sudo v1.6.9p17 hasta v1.6.9p19, no interpreta correctamente un grupo del sistema (también conocido como %group) en el fichero sudoers durante la decisión de autorización para un usuario que pertenezca a ese grupo. Esto permite a usuarios locales utilizar un fichero sudoers y obtener privilegios de root (administrador) a través de un comando sudo.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
Medium
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-12-15 CVE Reserved
  • 2009-01-30 CVE Published
  • 2024-03-21 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-863: Incorrect Authorization
CAPEC
References (21)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Gratisoft
Search vendor "Gratisoft"
Sudo
Search vendor "Gratisoft" for product "Sudo"
1.6.9
Search vendor "Gratisoft" for product "Sudo" and version "1.6.9"
p17
Affected
Gratisoft
Search vendor "Gratisoft"
Sudo
Search vendor "Gratisoft" for product "Sudo"
1.6.9
Search vendor "Gratisoft" for product "Sudo" and version "1.6.9"
p18
Affected
Gratisoft
Search vendor "Gratisoft"
Sudo
Search vendor "Gratisoft" for product "Sudo"
1.6.9
Search vendor "Gratisoft" for product "Sudo" and version "1.6.9"
p19
Affected
Vmware
Search vendor "Vmware"
Esx
Search vendor "Vmware" for product "Esx"
4.0
Search vendor "Vmware" for product "Esx" and version "4.0"
-
Affected