Vulnerability Description
Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Todd Miller | Sudo | 1.8.0 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html
- http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_Exploit
- http://security.gentoo.org/glsa/glsa-201203-06.xml
- http://www.sudo.ws/sudo/alerts/sudo_debug.htmlExploitVendor Advisory
- http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html
- http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_Exploit
- http://security.gentoo.org/glsa/glsa-201203-06.xml
- http://www.sudo.ws/sudo/alerts/sudo_debug.htmlExploitVendor Advisory
FAQ
What is CVE-2012-0809?
CVE-2012-0809 is a vulnerability with a CVSS score of 7.2 (HIGH). Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
How severe is CVE-2012-0809?
CVE-2012-0809 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0809?
Check the references section above for vendor advisories and patch information. Affected products include: Todd Miller Sudo.