CVE-2014-0106

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Sudo 1.6.9 before 1.8.5, when env_reset is disabled, does not properly check environment variables for the env_delete restriction, which allows local users with sudo permissions to bypass intended command restrictions via a crafted environment variable.

References

http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00003.html

http://rhn.redhat.com/errata/RHSA-2014-0266.html

http://www.openwall.com/lists/oss-security/2014/03/06/2

http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html

http://www.securityfocus.com/bid/65997

http://www.sudo.ws/sudo/alerts/env_add.html

http://www.ubuntu.com/usn/USN-2146-1

https://support.apple.com/kb/HT205031

Details

Source: MITRE

Published: 2014-03-11

Updated: 2017-12-16

Type: CWE-20

Risk Information

CVSS v2

Base Score: 6.6

Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 2.7

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* versions up to 10.10.4 (inclusive)

Configuration 2

OR

cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p7:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p8:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p9:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.7.10p10:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*

cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
91755OracleVM 3.2 : sudo (OVMSA-2016-0079)NessusOracleVM Local Security Checks
medium
8981Mac OS X < 10.10.5 Multiple VulnerabilitiesNessus Network MonitorOperating System Detection
high
85408Mac OS X 10.10.x < 10.10.5 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
high
82144Debian DLA-160-1 : sudo security updateNessusDebian Local Security Checks
low
76287GLSA-201406-30 : sudo: Privilege escalationNessusGentoo Local Security Checks
medium
73327SuSE 11.3 Security Update : sudo (SAT Patch Number 9044)NessusSuSE Local Security Checks
medium
73016Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.10 : sudo vulnerabilities (USN-2146-1)NessusUbuntu Local Security Checks
medium
72924Scientific Linux Security Update : sudo on SL5.x i386/x86_64 (20140310)NessusScientific Linux Local Security Checks
medium
72923RHEL 5 : sudo (RHSA-2014:0266)NessusRed Hat Local Security Checks
medium
72922Oracle Linux 5 : sudo (ELSA-2014-0266)NessusOracle Linux Local Security Checks
medium
72910CentOS 5 : sudo (CESA-2014:0266)NessusCentOS Local Security Checks
medium
72838Slackware 13.0 / 13.1 / 13.37 : sudo (SSA:2014-064-01)NessusSlackware Local Security Checks
medium