The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-2062-1 | New sudo packages fix environment sanitization bypass vulnerability |
![]() |
EUVD-2010-1667 | The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable. |
![]() |
USN-956-1 | sudo vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T01:28:41.583Z
Reserved: 2010-04-29T00:00:00
Link: CVE-2010-1646

No data.

Status : Deferred
Published: 2010-06-07T17:12:48.123
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-1646


No data.