sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by /home///file.txt.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Sudo | Sudo_project | * | 1.8.14 (including) |
Sudo | Ubuntu | esm-infra-legacy/trusty | * |
Sudo | Ubuntu | precise | * |
Sudo | Ubuntu | precise/esm | * |
Sudo | Ubuntu | trusty | * |
Sudo | Ubuntu | trusty/esm | * |
Sudo | Ubuntu | upstream | * |
Sudo | Ubuntu | vivid | * |
Sudo | Ubuntu | vivid/stable-phone-overlay | * |
Sudo | Ubuntu | vivid/ubuntu-core | * |
Sudo | Ubuntu | wily | * |