CVE-2010-1163

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 13%
VendorProductVersion
todd_millersudo
1.6.8
todd_millersudo
1.6.8_p1:_p1
todd_millersudo
1.6.8_p2:_p2
todd_millersudo
1.6.8_p5:_p5
todd_millersudo
1.6.8_p7:_p7
todd_millersudo
1.6.8_p8:_p8
todd_millersudo
1.6.8_p9:_p9
todd_millersudo
1.6.8_p12:_p12
todd_millersudo
1.6.8p7:p7
todd_millersudo
1.6.9_p17:_p17
todd_millersudo
1.6.9_p18:_p18
todd_millersudo
1.6.9_p19:_p19
todd_millersudo
1.6.9_p20:_p20
todd_millersudo
1.6.9_p21:_p21
todd_millersudo
1.6.9_p22:_p22
todd_millersudo
1.7.0
todd_millersudo
1.7.1
todd_millersudo
1.7.2p1:p1
todd_millersudo
1.7.2p2:p2
todd_millersudo
1.7.2p3:p3
todd_millersudo
1.7.2p4:p4
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sudo
bullseye (security)
1.9.5p2-3+deb11u1
fixed
bullseye
1.9.5p2-3+deb11u1
fixed
lenny
not-affected
bookworm
1.9.13p3-1+deb12u1
fixed
sid
1.9.16-2
fixed
trixie
1.9.16-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sudo
karmic
Fixed 1.7.0-1ubuntu2.2
released
jaunty
Fixed 1.6.9p17-1ubuntu3.2
released
intrepid
Fixed 1.6.9p17-1ubuntu2.3
released
hardy
Fixed 1.6.9p10-1ubuntu3.7
released
dapper
Fixed 1.6.8p12-1ubuntu6.2
released
References