UBUNTU-CVE-2015-5602

Source
https://ubuntu.com/security/CVE-2015-5602
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-5602.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-5602
Upstream
Published
2015-11-17T15:59:00Z
Modified
2025-09-08T16:43:26Z
Severity
  • Ubuntu - medium
Summary
[none]
Details

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home///file.txt."

References

Affected packages

Ubuntu:Pro:14.04:LTS / sudo

Package

Name
sudo
Purl
pkg:deb/ubuntu/sudo@1.8.9p5-1ubuntu1.5+esm8?arch=source&distro=esm-infra-legacy/trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.8.6p3-0ubuntu3
1.8.8-2ubuntu1
1.8.8-2ubuntu2
1.8.9p4-1ubuntu1
1.8.9p4-1ubuntu2
1.8.9p5-1ubuntu1
1.8.9p5-1ubuntu1.1
1.8.9p5-1ubuntu1.2
1.8.9p5-1ubuntu1.3
1.8.9p5-1ubuntu1.4
1.8.9p5-1ubuntu1.5+esm1
1.8.9p5-1ubuntu1.5+esm2
1.8.9p5-1ubuntu1.5+esm3
1.8.9p5-1ubuntu1.5+esm5
1.8.9p5-1ubuntu1.5+esm6
1.8.9p5-1ubuntu1.5+esm7
1.8.9p5-1ubuntu1.5+esm8

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "1.8.9p5-1ubuntu1.5+esm8",
            "binary_name": "sudo"
        },
        {
            "binary_version": "1.8.9p5-1ubuntu1.5+esm8",
            "binary_name": "sudo-ldap"
        }
    ]
}