sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2014/10/15/24 | Exploit Mailing List Third Party Advisory |
http://rhn.redhat.com/errata/RHSA-2015-1409.html | |
http://www.securitytracker.com/id/1033158 | |
http://www.sudo.ws/alerts/tz.html | Vendor Advisory |
https://security.gentoo.org/glsa/201504-02 |
Configurations
History
No history.
Information
Published : 2017-04-24 06:59
Updated : 2024-02-04 19:11
NVD link : CVE-2014-9680
Mitre link : CVE-2014-9680
CVE.ORG link : CVE-2014-9680
JSON object : View
Products Affected
sudo_project
- sudo
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor