sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=820677 | x_refsource_CONFIRM |
| http://secunia.com/advisories/49219 | third-party-advisory x_refsource_SECUNIA |
| http://secunia.com/advisories/49948 | third-party-advisory x_refsource_SECUNIA |
| http://secunia.com/advisories/49244 | third-party-advisory x_refsource_SECUNIA |
| http://www.mandriva.com/security/advisories?name=MDVSA-2012:079 | vendor-advisory x_refsource_MANDRIVA |
| http://secunia.com/advisories/49291 | third-party-advisory x_refsource_SECUNIA |
| http://www.debian.org/security/2012/dsa-2478 | vendor-advisory x_refsource_DEBIAN |
| http://www.securitytracker.com/id?1027077 | vdb-entry x_refsource_SECTRACK |
| https://www.suse.com/security/cve/CVE-2012-2337/ | x_refsource_MISC |
| http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081432.html | vendor-advisory x_refsource_FEDORA |
| http://www.sudo.ws/sudo/alerts/netmask.html | x_refsource_CONFIRM |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|