CVE-2013-1775

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.9 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:C/I:C/A:C
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
todd_millersudo
1.6
todd_millersudo
1.6.1
todd_millersudo
1.6.2
todd_millersudo
1.6.2p3:p3
todd_millersudo
1.6.3
todd_millersudo
1.6.3_p7:_p7
todd_millersudo
1.6.4
todd_millersudo
1.6.4p2:p2
todd_millersudo
1.6.5
todd_millersudo
1.6.6
todd_millersudo
1.6.7
todd_millersudo
1.6.7p5:p5
todd_millersudo
1.6.8
todd_millersudo
1.6.8p12:p12
todd_millersudo
1.6.9
todd_millersudo
1.6.9p20:p20
todd_millersudo
1.6.9p21:p21
todd_millersudo
1.6.9p22:p22
todd_millersudo
1.6.9p23:p23
todd_millersudo
1.8.0
todd_millersudo
1.8.1
todd_millersudo
1.8.1p1:p1
todd_millersudo
1.8.1p2:p2
todd_millersudo
1.8.2
todd_millersudo
1.8.3
todd_millersudo
1.8.3p1:p1
todd_millersudo
1.8.3p2:p2
todd_millersudo
1.8.4
todd_millersudo
1.8.4p1:p1
todd_millersudo
1.8.4p2:p2
todd_millersudo
1.8.4p3:p3
todd_millersudo
1.8.4p4:p4
todd_millersudo
1.8.4p5:p5
todd_millersudo
1.8.5
todd_millersudo
1.8.5p1:p1
todd_millersudo
1.8.5p2:p2
todd_millersudo
1.8.5p3:p3
todd_millersudo
1.8.6
todd_millersudo
1.8.6p1:p1
todd_millersudo
1.8.6p2:p2
todd_millersudo
1.8.6p3:p3
todd_millersudo
1.8.6p4:p4
todd_millersudo
1.8.6p5:p5
todd_millersudo
1.8.6p6:p6
applemac_os_x
𝑥
≤ 10.10.4
todd_millersudo
1.7.0
todd_millersudo
1.7.1
todd_millersudo
1.7.2
todd_millersudo
1.7.2p1:p1
todd_millersudo
1.7.2p2:p2
todd_millersudo
1.7.2p3:p3
todd_millersudo
1.7.2p4:p4
todd_millersudo
1.7.2p5:p5
todd_millersudo
1.7.2p6:p6
todd_millersudo
1.7.2p7:p7
todd_millersudo
1.7.3b1:b1
todd_millersudo
1.7.4
todd_millersudo
1.7.4p1:p1
todd_millersudo
1.7.4p2:p2
todd_millersudo
1.7.4p3:p3
todd_millersudo
1.7.4p4:p4
todd_millersudo
1.7.4p5:p5
todd_millersudo
1.7.4p6:p6
todd_millersudo
1.7.5
todd_millersudo
1.7.6
todd_millersudo
1.7.6p1:p1
todd_millersudo
1.7.6p2:p2
todd_millersudo
1.7.7
todd_millersudo
1.7.8
todd_millersudo
1.7.8p1:p1
todd_millersudo
1.7.8p2:p2
todd_millersudo
1.7.9
todd_millersudo
1.7.9p1:p1
todd_millersudo
1.7.10
todd_millersudo
1.7.10p1:p1
todd_millersudo
1.7.10p2:p2
todd_millersudo
1.7.10p3:p3
todd_millersudo
1.7.10p4:p4
todd_millersudo
1.7.10p5:p5
todd_millersudo
1.7.10p6:p6
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
sudo
bullseye
1.9.5p2-3+deb11u1
fixed
bullseye (security)
1.9.5p2-3+deb11u1
fixed
bookworm
1.9.13p3-1+deb12u1
fixed
sid
1.9.16-2
fixed
trixie
1.9.16-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
sudo
quantal
Fixed 1.8.5p2-1ubuntu1.1
released
precise
Fixed 1.8.3p1-1ubuntu3.4
released
oneiric
Fixed 1.7.4p6-1ubuntu2.2
released
lucid
Fixed 1.7.2p1-1ubuntu5.6
released
hardy
Fixed 1.6.9p10-1ubuntu3.10
released
Common Weakness Enumeration
References