GLSA-201401-23 : sudo: Privilege escalation

medium Nessus Plugin ID 72078


The remote Gentoo host is missing one or more security-related patches.


The remote host is affected by the vulnerability described in GLSA-201401-23 (sudo: Privilege escalation)

Multiple vulnerabilities have been found in sudo:
sudo does not correctly validate the controlling terminal on a system without /proc or when the tty_tickets option is enabled.
sudo does not properly handle the clock when it is set to the epoch.
Impact :

A local attacker with sudo privileges could connect to the stdin, stdout, and stderr of the terminal of a user who has authenticated with sudo, allowing the attacker to hijack the authorization of the other user. Additionally, a local or physically proximate attacker could set the system clock to the epoch, bypassing time restrictions on sudo authentication.
Workaround :

There is no known workaround at this time.


All sudo users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=app-admin/sudo-1.8.6_p7'

See Also

Plugin Details

Severity: Medium

ID: 72078

File Name: gentoo_GLSA-201401-23.nasl

Version: 1.8

Type: local

Published: 1/22/2014

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: High

Score: 8.9


Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:sudo, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/21/2014

Exploitable With


Metasploit (Mac OS X Sudo Password Bypass)

Reference Information

CVE: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776, CVE-2013-2777

BID: 58203, 58207, 62741

GLSA: 201401-23