Vulnerability Details : CVE-2013-1775
Public exploit exists!
sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
Exploit prediction scoring system (EPSS) score for CVE-2013-1775
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 11 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-1775
-
Mac OS X Sudo Password Bypass
Disclosure Date: 2013-02-28First seen: 2020-04-26exploit/osx/local/sudo_password_bypassThis module gains a session with root permissions on versions of OS X with sudo binary vulnerable to CVE-2013-1775. Tested working on Mac OS 10.7-10.8.4, and possibly lower versions. If your session belongs to a user with Administrative Privileges (the user
CVSS scores for CVE-2013-1775
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.9
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:C/A:C |
3.4
|
10.0
|
NIST |
CWE ids for CVE-2013-1775
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-1775
-
http://rhn.redhat.com/errata/RHSA-2013-1353.html
RHSA-2013:1353 - Security Advisory - Red Hat Customer Portal
-
http://rhn.redhat.com/errata/RHSA-2013-1701.html
RHSA-2013:1701 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-updates/2013-03/msg00066.html
openSUSE-SU-2013:0495-1: sudo: fixed two security issues
-
http://www.securityfocus.com/bid/58203
Todd Miller Sudo CVE-2013-1775 Local Authentication Bypass Vulnerability
-
http://www.sudo.ws/repos/sudo/rev/ebd6cc75020f
sudo: ebd6cc75020fExploit;Patch
-
https://support.apple.com/kb/HT205031
About the security content of OS X Yosemite v10.10.5 and Security Update 2015-006 - Apple SupportVendor Advisory
-
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2013&m=slackware-security.517440
The Slackware Linux Project: Slackware Security Advisories
-
http://www.ubuntu.com/usn/USN-1754-1
USN-1754-1: Sudo vulnerability | Ubuntu security notices
-
http://support.apple.com/kb/HT5880
About the security content of OS X Mountain Lion v10.8.5 and Security Update 2013-004 - Apple Support
-
http://www.debian.org/security/2013/dsa-2642
Debian -- Security Information -- DSA-2642-1 sudo
-
http://www.sudo.ws/repos/sudo/rev/ddf399e3e306
sudo: ddf399e3e306Exploit;Patch
-
http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
Apple - Lists.apple.com
-
http://www.sudo.ws/sudo/alerts/epoch_ticket.html
Authentication bypass when clock is resetVendor Advisory
-
http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
Oracle VM Server for x86 Bulletin - July 2016
-
http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
Apple - Lists.apple.com
-
http://www.openwall.com/lists/oss-security/2013/02/27/22
oss-security - CVE request: sudo authentication bypass when clock is reset
Products affected by CVE-2013-1775
- cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.2p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8p12:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.7p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p20:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p21:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p22:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.3b1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9p23:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.1p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.3p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.1p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.3p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.5p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.5p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.4p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.5p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.8p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.9p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.4p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.6p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.6p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.8p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.10p4:*:*:*:*:*:*:*