Vulnerability Description
sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sudo Project | Sudo | <= 1.8.11 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2014/10/15/24ExploitMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1409.html
- http://www.securitytracker.com/id/1033158
- http://www.sudo.ws/alerts/tz.htmlVendor Advisory
- https://security.gentoo.org/glsa/201504-02
- http://openwall.com/lists/oss-security/2014/10/15/24ExploitMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1409.html
- http://www.securitytracker.com/id/1033158
- http://www.sudo.ws/alerts/tz.htmlVendor Advisory
- https://security.gentoo.org/glsa/201504-02
FAQ
What is CVE-2014-9680?
CVE-2014-9680 is a vulnerability with a CVSS score of 3.3 (LOW). sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by...
How severe is CVE-2014-9680?
CVE-2014-9680 has been rated LOW with a CVSS base score of 3.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9680?
Check the references section above for vendor advisories and patch information. Affected products include: Sudo Project Sudo.