CVE-2016-7076
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
29/05/2018
Last modified:
07/11/2023
Description
sudo before version 1.8.18p1 is vulnerable to a bypass in the sudo noexec restriction if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
7.20
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* | 1.6.8 (including) | 1.8.18 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://rhn.redhat.com/errata/RHSA-2016-2872.html
- http://www.securityfocus.com/bid/95778
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7076
- https://security.netapp.com/advisory/ntap-20181127-0002/
- https://usn.ubuntu.com/3968-1/
- https://usn.ubuntu.com/3968-3/
- https://www.sudo.ws/alerts/noexec_wordexp.html



