sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be a user, who can already log into your system, and can already use sudo.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kerberos_5 | Mit | - (including) | - (including) |
Sudo | Todd_miller | 1.6.8_p12 (including) | 1.6.8_p12 (including) |