sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-707-1 | sudo security update |
EUVD |
EUVD-2016-7956 | sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges. |
Ubuntu USN |
USN-3968-1 | Sudo vulnerabilities |
Ubuntu USN |
USN-3968-3 | Sudo vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T01:50:46.972Z
Reserved: 2016-08-23T00:00:00
Link: CVE-2016-7076
No data.
Status : Modified
Published: 2018-05-29T13:29:00.210
Modified: 2024-11-21T02:57:24.680
Link: CVE-2016-7076
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN