Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sudo | Todd_miller | 1.8.0 (including) | 1.8.0 (including) |
Sudo | Todd_miller | 1.8.1 (including) | 1.8.1 (including) |
Sudo | Todd_miller | 1.8.1p1 (including) | 1.8.1p1 (including) |
Sudo | Todd_miller | 1.8.1p2 (including) | 1.8.1p2 (including) |
Sudo | Todd_miller | 1.8.2 (including) | 1.8.2 (including) |
Sudo | Todd_miller | 1.8.3 (including) | 1.8.3 (including) |
Sudo | Todd_miller | 1.8.3p1 (including) | 1.8.3p1 (including) |
Sudo | Ubuntu | devel | * |
Sudo | Ubuntu | precise | * |
Sudo | Ubuntu | upstream | * |