Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.
The product uses a function that accepts a format string as an argument, but the format string originates from an external source.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-201203-06.xml | vendor advisory |
http://archives.neohapsis.com/archives/fulldisclosure/2012-01/att-0591/advisory_sudo.txt | exploit |
http://archives.neohapsis.com/archives/fulldisclosure/2012-01/0591.html | mailing list |
http://www.sudo.ws/sudo/alerts/sudo_debug.html | exploit vendor advisory |