www.sudo.ws/sudo/alerts/env_add.html

Preview meta tags from the www.sudo.ws website.

Linked Hostnames

3

Search Engine Appearance

Google

https://www.sudo.ws/sudo/alerts/env_add.html

Security policy bypass when env_reset is disabled

If the env_reset option is disabled in the sudoers file, a malicious user with sudo permissions may be able to run arbitrary commands with elevated privileges by manipulating the environment of a command the user is legitimately allowed to run. Sudo versions affected: Sudo 1.6.9 through 1.8.4p5 inclusive. Sudo 1.8.5 and higher are not affected.



Bing

Security policy bypass when env_reset is disabled

https://www.sudo.ws/sudo/alerts/env_add.html

If the env_reset option is disabled in the sudoers file, a malicious user with sudo permissions may be able to run arbitrary commands with elevated privileges by manipulating the environment of a command the user is legitimately allowed to run. Sudo versions affected: Sudo 1.6.9 through 1.8.4p5 inclusive. Sudo 1.8.5 and higher are not affected.



DuckDuckGo

https://www.sudo.ws/sudo/alerts/env_add.html

Security policy bypass when env_reset is disabled

If the env_reset option is disabled in the sudoers file, a malicious user with sudo permissions may be able to run arbitrary commands with elevated privileges by manipulating the environment of a command the user is legitimately allowed to run. Sudo versions affected: Sudo 1.6.9 through 1.8.4p5 inclusive. Sudo 1.8.5 and higher are not affected.

  • General Meta Tags

    22
    • title
      Security policy bypass when env_reset is disabled | Sudo
    • title
      Open Navigation
    • title
      Close Navigation
    • title
      GitHub
    • title
      Blog
  • Open Graph Meta Tags

    5
    • og:title
      Security policy bypass when env_reset is disabled
    • og:site_name
      Sudo
    • og:description
      If the env_reset option is disabled in the sudoers file, a malicious user with sudo permissions may be able to run arbitrary commands with elevated privileges by manipulating the environment of a command the user is legitimately allowed to run. Sudo versions affected: Sudo 1.6.9 through 1.8.4p5 inclusive. Sudo 1.8.5 and higher are not affected.
    • og:type
      article
    • og:url
      https://www.sudo.ws/security/advisories/env_add/
  • Twitter Meta Tags

    3
    • twitter:card
      summary
    • twitter:title
      Security policy bypass when env_reset is disabled
    • twitter:description
      If the env_reset option is disabled in the sudoers file, a malicious user with sudo permissions may be able to run arbitrary commands with elevated privileges by manipulating the environment of a command the user is legitimately allowed to run. Sudo versions affected: Sudo 1.6.9 through 1.8.4p5 inclusive. Sudo 1.8.5 and higher are not affected.
  • Link Tags

    16
    • apple-touch-icon
      /favicon/apple-touch-icon.png
    • canonical
      https://www.sudo.ws/security/advisories/env_add/
    • icon
      /favicon/favicon-32x32.png
    • icon
      /favicon/favicon-16x16.png
    • manifest
      /favicon/site.webmanifest

Links

55