HomeSudo ProjectCVE-2015-5602

CVE-2015-5602

UNKNOWN
7.2CVSS
Published: 2015-11-17
Updated: 2025-04-12
AI Analysis

Description

sudoedit in Sudo before 1.8.15 allows local users to gain privileges via a symlink attack on a file whose full path is defined using multiple wildcards in /etc/sudoers, as demonstrated by "/home/*/*/file.txt."

CVSS Metrics

Vector
AV:L/AC:L/Au:N/C:C/I:C/A:C
Access Vector
local
Access Cmplx
low
Auth
none
Confidentiality
complete
Integrity
complete
Availability
complete
Weaknesses
CWE-264

Metadata

Primary Vendor
SUDO_PROJECT
Published
11/17/2015
Last Modified
4/12/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sudo_project : sudo

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2015-5602 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com