Added |
CPE Configuration |
|
OR
*cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-:*:*:*:*:*:*:*
*cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*
*cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:* versions up to (excluding) 1.9.5
*cpe:2.3:a:sudo_project:sudo:1.9.5:patch1:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
Added |
CPE Configuration |
|
OR
*cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
*cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
|
Added |
CVSS V2 |
|
NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
|
Added |
CVSS V3.1 |
|
NIST AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Added |
CWE |
|
NIST CWE-787
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html No Types Assigned
|
http://packetstormsecurity.com/files/161160/Sudo-Heap-Based-Buffer-Overflow.html Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html No Types Assigned
|
http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html No Types Assigned
|
http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html Exploit, Third Party Advisory, VDB Entry
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2021/01/26/3 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2021/01/26/3 Exploit, Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2021/01/27/1 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2021/01/27/1 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
http://www.openwall.com/lists/oss-security/2021/01/27/2 No Types Assigned
|
http://www.openwall.com/lists/oss-security/2021/01/27/2 Mailing List, Third Party Advisory
|
Changed |
Reference Type |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/ No Types Assigned
|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CALA5FTXIQBRRYUA2ZQNJXB6OQMAXEII/ Third Party Advisory
|
Changed |
Reference Type |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/ No Types Assigned
|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LHXK6ICO5AYLGFK2TAX5MZKUXTUKWOJY/ Third Party Advisory
|
Changed |
Reference Type |
https://security.gentoo.org/glsa/202101-33 No Types Assigned
|
https://security.gentoo.org/glsa/202101-33 Third Party Advisory
|
Changed |
Reference Type |
https://security.netapp.com/advisory/ntap-20210128-0001/ No Types Assigned
|
https://security.netapp.com/advisory/ntap-20210128-0001/ Third Party Advisory
|
Changed |
Reference Type |
https://security.netapp.com/advisory/ntap-20210128-0002/ No Types Assigned
|
https://security.netapp.com/advisory/ntap-20210128-0002/ Third Party Advisory
|
Changed |
Reference Type |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM No Types Assigned
|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sudo-privesc-jan2021-qnYQfcM Third Party Advisory
|
Changed |
Reference Type |
https://www.debian.org/security/2021/dsa-4839 No Types Assigned
|
https://www.debian.org/security/2021/dsa-4839 Third Party Advisory
|
Changed |
Reference Type |
https://www.openwall.com/lists/oss-security/2021/01/26/3 No Types Assigned
|
https://www.openwall.com/lists/oss-security/2021/01/26/3 Exploit, Mailing List, Third Party Advisory
|
Changed |
Reference Type |
https://www.sudo.ws/stable.html#1.9.5p2 No Types Assigned
|
https://www.sudo.ws/stable.html#1.9.5p2 Release Notes, Vendor Advisory
|