Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2012-0809Use of Externally-Controlled Format String in Miller Sudo

Severity
7.2HIGHNVD
EPSS
45.6%
top 2.38%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 1
Latest updateMay 14

Description

Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8.3p1 allows local users to execute arbitrary code via format string sequences in the program name for sudo.

CVSS vector

AV:L/AC:L/C:C/I:C/A:CExploitability: 3.9 | Impact: 10.0

Affected Packages2 packages

Debiansudo_project/sudo< 1.8.3p2-1+3
NVDtodd_miller/sudo7 versions+6

🔴Vulnerability Details

3
GHSA
GHSA-6785-8cf2-mmj4: Format string vulnerability in the sudo_debug function in Sudo 12022-05-14
OSV
CVE-2012-0809: Format string vulnerability in the sudo_debug function in Sudo 12012-02-01
CVEList
CVE-2012-0809: Format string vulnerability in the sudo_debug function in Sudo 12012-02-01

💥Exploits & PoCs

2
Exploit-DB
sudo 1.8.0 < 1.8.3p1 - 'sudo_debug' glibc FORTIFY_SOURCE Bypass + Privilege Escalation2013-05-01
Exploit-DB
sudo 1.8.0 < 1.8.3p1 - Format String2012-01-31

📋Vendor Advisories

2
Red Hat
sudo: format string flaw in sudo_debug()2012-01-30
Debian
CVE-2012-0809: sudo - Format string vulnerability in the sudo_debug function in Sudo 1.8.0 through 1.8...2012

💬Community

2
Bugzilla
CVE-2012-0809 sudo: format string flaw in sudo_debug() [fedora-16]2012-01-30
Bugzilla
CVE-2012-0809 sudo: format string flaw in sudo_debug()2012-01-24
CVE-2012-0809 — Todd Miller Sudo vulnerability | cvebase