CVE-2007-3149

6 documents6 sources
Severity
7.2HIGH
EPSS
0.0%
top 84.92%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 11
Latest updateMay 1

Description

sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users to gain privileges, in a manner unintended by the sudo security model, via certain KRB5_ environment variable settings. NOTE: another researcher disputes this vulnerability, stating that the attacker must be "a user, who can already log into your system, and can already use sudo."

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages1 packages

NVDtodd_miller/sudo1.6.8_p12

🔴Vulnerability Details

2
GHSA
GHSA-76wc-mqwv-wjv2: sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users2022-05-01
CVEList
CVE-2007-3149: sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a user can currently authenticate to Kerberos, which allows local users2007-06-11

📋Vendor Advisories

2
Red Hat
Local authentication bypass in sudo2007-06-06
Debian
CVE-2007-3149: sudo - sudo, when linked with MIT Kerberos 5 (krb5), does not properly check whether a ...2007

💬Community

1
Bugzilla
CVE-2007-3149 Local authentication bypass in sudo2007-06-11