// For flags

CVE-2010-1163

sudo: incomplete fix for the sudoedit privilege escalation issue CVE-2010-0426

Severity Score

7.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

El comando de funcionalidad matching en sudo v1.6.8 hasta v1.7.2p5 no maneja adecuadamente cuando un fichero en el directorio actual de trabajo tiene el mismo nombre que un pseudo-comando en el archivo dudoers y que contiene en la ruta una entrada para ".", lo que permite a usuarios locales ejecutar comandos de su elección a través de un troyano ejecutable, como ha sido demostrado usando sudoedit, una vulnerabilidad diferente que CVE-2010-0426.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
High
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-03-29 CVE Reserved
  • 2010-04-16 CVE Published
  • 2024-08-07 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
References (30)
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p1
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p1"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p2
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p2"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p5
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p5"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p7
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p7"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p8
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p8"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p9
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p9"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8_p12
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8_p12"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.8p7
Search vendor "Todd Miller" for product "Sudo" and version "1.6.8p7"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.9_p17
Search vendor "Todd Miller" for product "Sudo" and version "1.6.9_p17"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.9_p18
Search vendor "Todd Miller" for product "Sudo" and version "1.6.9_p18"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.9_p19
Search vendor "Todd Miller" for product "Sudo" and version "1.6.9_p19"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.9_p20
Search vendor "Todd Miller" for product "Sudo" and version "1.6.9_p20"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.9_p21
Search vendor "Todd Miller" for product "Sudo" and version "1.6.9_p21"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.6.9_p22
Search vendor "Todd Miller" for product "Sudo" and version "1.6.9_p22"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.7.0
Search vendor "Todd Miller" for product "Sudo" and version "1.7.0"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.7.1
Search vendor "Todd Miller" for product "Sudo" and version "1.7.1"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.7.2p1
Search vendor "Todd Miller" for product "Sudo" and version "1.7.2p1"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.7.2p2
Search vendor "Todd Miller" for product "Sudo" and version "1.7.2p2"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.7.2p3
Search vendor "Todd Miller" for product "Sudo" and version "1.7.2p3"
-
Affected
Todd Miller
Search vendor "Todd Miller"
Sudo
Search vendor "Todd Miller" for product "Sudo"
1.7.2p4
Search vendor "Todd Miller" for product "Sudo" and version "1.7.2p4"
-
Affected