Access Restriction Bypass Affecting sudo package, versions [,1.7.10p7)[1.8.67, 1.8.6p7)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
0.05% (19th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SUDO-2368602
  • published26 Jan 2022
  • disclosed5 Mar 2013
  • creditUnknown

Introduced: 5 Mar 2013

CVE-2013-1775  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

Upgrade sudo to version 1.7.10p7, 1.8.6p7 or higher.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

References

CVSS Scores

version 3.1