Vulnerability Description
sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Todd Miller | Sudo | 1.6 |
Related Weaknesses (CWE)
References
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html
- http://secunia.com/advisories/49219
- http://secunia.com/advisories/49244
- http://secunia.com/advisories/49291
- http://secunia.com/advisories/49948
- http://www.debian.org/security/2012/dsa-2478
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:079
- http://www.securitytracker.com/id?1027077
- http://www.sudo.ws/sudo/alerts/netmask.htmlVendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=820677
- https://www.suse.com/security/cve/CVE-2012-2337/
- http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html
- http://secunia.com/advisories/49219
- http://secunia.com/advisories/49244
- http://secunia.com/advisories/49291
FAQ
What is CVE-2012-2337?
CVE-2012-2337 is a vulnerability with a CVSS score of 7.2 (HIGH). sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in o...
How severe is CVE-2012-2337?
CVE-2012-2337 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-2337?
Check the references section above for vendor advisories and patch information. Affected products include: Todd Miller Sudo.