Description
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-707-1 | sudo security update |
EUVD |
EUVD-2016-7956 | sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges. |
Ubuntu USN |
USN-3968-1 | Sudo vulnerabilities |
Ubuntu USN |
USN-3968-3 | Sudo vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:50:46.972Z
Reserved: 2016-08-23T00:00:00.000Z
Link: CVE-2016-7076
No data.
Status : Modified
Published: 2018-05-29T13:29:00.210
Modified: 2024-11-21T02:57:24.680
Link: CVE-2016-7076
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN