CVE-2012-0809
sudo 1.8.0 < 1.8.3p1 - Format String
Severity Score
7.2
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
4
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
Una vulnerabilidad de formato de cadena en la función sudo_debug en Sudo v1.8.0 a v1.8.3p1 permite a usuarios locales ejecutar código de su elección a través de secuencias de formato de cadena en el nombre del programa ejecutado en sudo.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-01-19 CVE Reserved
- 2012-01-31 First Exploit
- 2012-02-01 CVE Published
- 2024-08-06 CVE Updated
- 2024-11-10 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-134: Use of Externally-Controlled Format String
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html | Mailing List |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/18436 | 2012-01-31 | |
https://www.exploit-db.com/exploits/25134 | 2013-05-01 | |
http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_sudo.txt | 2024-08-06 | |
http://www.sudo.ws/sudo/alerts/sudo_debug.html | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://security.gentoo.org/glsa/glsa-201203-06.xml | 2018-01-05 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.0 Search vendor "Todd Miller" for product "Sudo" and version "1.8.0" | - |
Affected
| ||||||
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.1 Search vendor "Todd Miller" for product "Sudo" and version "1.8.1" | - |
Affected
| ||||||
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.1p1 Search vendor "Todd Miller" for product "Sudo" and version "1.8.1p1" | - |
Affected
| ||||||
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.1p2 Search vendor "Todd Miller" for product "Sudo" and version "1.8.1p2" | - |
Affected
| ||||||
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.2 Search vendor "Todd Miller" for product "Sudo" and version "1.8.2" | - |
Affected
| ||||||
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.3 Search vendor "Todd Miller" for product "Sudo" and version "1.8.3" | - |
Affected
| ||||||
Todd Miller Search vendor "Todd Miller" | Sudo Search vendor "Todd Miller" for product "Sudo" | 1.8.3p1 Search vendor "Todd Miller" for product "Sudo" and version "1.8.3p1" | - |
Affected
|