The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2062-1 | New sudo packages fix environment sanitization bypass vulnerability |
EUVD |
EUVD-2010-1667 | The secure path feature in env.c in sudo 1.3.1 through 1.6.9p22 and 1.7.0 through 1.7.2p6 does not properly handle an environment that contains multiple PATH variables, which might allow local users to gain privileges via a crafted value of the last PATH variable. |
Ubuntu USN |
USN-956-1 | sudo vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T01:28:41.583Z
Reserved: 2010-04-29T00:00:00
Link: CVE-2010-1646
No data.
Status : Deferred
Published: 2010-06-07T17:12:48.123
Modified: 2025-04-11T00:51:21.963
Link: CVE-2010-1646
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN