[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:68832
sudo: Provide limited super user privileges to specific users. It was discovered that Sudo incorrectly handled memory when parsing command lines. A local attacker could possibly use this issue to obtain unintended access to the administrator account.

oval:org.secpod.oval:def:1601415
When sudo runs a command in shell mode, either via the -s or -i command line option, it escapes special characters in the command"s arguments with a backslash. The sudoers policy plugin will then remove the escape characters from the arguments before evaluating the sudoers policy if the command is ...

oval:org.secpod.oval:def:97531
[CLSA-2021:1611743864] Fix CVE-2021-3156: Heap-based buffer overflow in sudo

oval:org.secpod.oval:def:119337
Sudo allows a system administrator to give certain users the ability to run some commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per- ...

oval:org.secpod.oval:def:119335
Sudo allows a system administrator to give certain users the ability to run some commands as root while logging all commands and arguments. Sudo operates on a per-command basis. It is not a replacement for the shell. Features include: the ability to restrict what commands a user may run on a per- ...

oval:org.secpod.oval:def:69153
The host is missing a security update according to Apple advisory, APPLE-SA-2021-02-09-1. The update is required to fix multiple vulnerabilities. The flaws are present in the application, which fails to handle multiple issues. Successful exploitation allow attackers to gain elevated privileges or ex ...

oval:org.secpod.oval:def:89044178
This update for sudo fixes the following issues: - L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156

oval:org.secpod.oval:def:69156
The host is installed with Apple Mac OS X 10.14.6, 10.15.7 or Apple Mac OS 11 before 11.2.1 and is prone to a privilege escalation vulnerability. A flaw is present in the application, which fails to properly handle an issue in sudo. Successful exploitation allows local attackers to gain elevated pri ...

oval:org.secpod.oval:def:68540
The Qualys Research Labs discovered a heap-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users. Any local user can exploit this flaw for root privilege escalation.

oval:org.secpod.oval:def:89044175
This update for sudo fixes the following issues: - L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156

oval:org.secpod.oval:def:1504606
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:89044093
This update for sudo fixes the following issues: - Fixed a potential crash on exit as a result of the fix of CVE-2021-3156 [bsc#1181090]

oval:org.secpod.oval:def:68542
sudo: Provide limited super user privileges to specific users Several security issues were fixed in Sudo.

oval:org.secpod.oval:def:89985
The remote host is missing a patch 152253-04 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:68823
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems. Security Fix: * An industry-wide issue was found in the way many modern micro ...

oval:org.secpod.oval:def:89984
The remote host is missing a patch 152252-04 containing a security fix. For more information please visit the reference link.

oval:org.secpod.oval:def:68824
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: * sudo: Heap buffer overflow in argument parsing ...

oval:org.secpod.oval:def:89002760
This update for sudo fixes the following issues: - A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges [bsc#1181090,CVE-2021-3156] - It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit` [bsc#1180684,CVE- ...

oval:org.secpod.oval:def:89044180
This update for sudo fixes the following issues: - L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156

oval:org.secpod.oval:def:1504607
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:705864
sudo: Provide limited super user privileges to specific users Several security issues were fixed in Sudo.

oval:org.secpod.oval:def:605414
The Qualys Research Labs discovered a heap-based buffer overflow vulnerability in sudo, a program designed to provide limited super user privileges to specific users. Any local user can exploit this flaw for root privilege escalation.

oval:org.secpod.oval:def:89002846
This update for sudo fixes the following issues: - A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges [bsc#1181090,CVE-2021-3156] - It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit` [bsc#1180684,CVE- ...

oval:org.secpod.oval:def:89002840
This update for sudo fixes the following issues: - A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges [bsc#1181090,CVE-2021-3156] - It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit` [bsc#1180684,CVE- ...

oval:org.secpod.oval:def:505774
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: * sudo: Heap buffer overflow in argument parsing ...

oval:org.secpod.oval:def:2500262
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root.

oval:org.secpod.oval:def:506844
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: * sudo: Heap buffer overflow in argument parsing ...

oval:org.secpod.oval:def:205833
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: * sudo: Heap buffer overflow in argument parsing ...

oval:org.secpod.oval:def:505775
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: * sudo: Heap buffer overflow in argument parsing ...

oval:org.secpod.oval:def:1700547
When sudo runs a command in shell mode, either via the -s or -i command line option, it escapes special characters in the command"s arguments with a backslash. The sudoers policy plugin will then remove the escape characters from the arguments before evaluating the sudoers policy if the command is ...

oval:org.secpod.oval:def:89002839
This update for sudo fixes the following issues: - A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges [bsc#1181090,CVE-2021-3156] - It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit` [bsc#1180684,CVE- ...

oval:org.secpod.oval:def:69585
The sudo packages contain the sudo utility which allows system administrators to provide certain users with the permission to execute privileged commands, which are used for system management purposes, without having to log in as root. Security Fix: * sudo: Heap buffer overflow in argument parsing ...

oval:org.secpod.oval:def:1504854
[1.8.6p3-29.0.3.el6_10.3] - Fix a bug on CVE-2021-3156.patch backported from ol7 [Orabug: 32717065]

oval:org.secpod.oval:def:1504611
The advisory is missing the security advisory description. For more information please visit the reference link

oval:org.secpod.oval:def:89044181
This update for sudo fixes the following issues: - L3: Tenable Scan reports sudo is vulnerable to CVE-2021-3156

oval:org.secpod.oval:def:89047251
This update for sudo fixes the following issues: - A Heap-based buffer overflow in sudo could be exploited to allow a user to gain root privileges [bsc#1181090,CVE-2021-3156] - It was possible for a user to test for the existence of a directory due to a Race Condition in `sudoedit` [bsc#1180684,CVE- ...

CWE    1
CWE-193
*CVE
CVE-2021-3156

© SecPod Technologies