Vulnerability Description
sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sudo Project | Sudo | <= 1.8.14 |
Related Weaknesses (CWE)
References
- http://bugzilla.sudo.ws/show_bug.cgi?id=707ExploitIssue Tracking
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.hThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.hThird Party Advisory
- http://www.debian.org/security/2016/dsa-3440
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securitytracker.com/id/1034392
- http://www.sudo.ws/stable.html#1.8.15Release NotesVendor Advisory
- https://security.gentoo.org/glsa/201606-13Third Party Advisory
- https://www.exploit-db.com/exploits/37710/ExploitThird Party Advisory
- http://bugzilla.sudo.ws/show_bug.cgi?id=707ExploitIssue Tracking
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.hThird Party Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.hThird Party Advisory
- http://www.debian.org/security/2016/dsa-3440
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securitytracker.com/id/1034392
FAQ
What is CVE-2015-5602?
CVE-2015-5602 is a vulnerability with a CVSS score of 7.2 (HIGH). sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/f...
How severe is CVE-2015-5602?
CVE-2015-5602 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5602?
Check the references section above for vendor advisories and patch information. Affected products include: Sudo Project Sudo.