HomeSudo ProjectCVE-2021-23239

CVE-2021-23239

LOW
2.5CVSS
Published: 2021-01-12
Updated: 2024-11-21
AI Analysis

Description

The sudoedit personality of Sudo before 1.9.5 may allow a local unprivileged user to perform arbitrary directory-existence tests by winning a sudo_edit.c race condition in replacing a user-controlled directory by a symlink to an arbitrary path.

CVSS Metrics

Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
Attack Vector
local
Complexity
high
Privileges
low
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-59

Metadata

Primary Vendor
SUDO_PROJECT
Published
1/12/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sudo_project : sudosudo_project : sudonetapp : cloud_backupnetapp : hci_management_nodenetapp : solidfirefedoraproject : fedorafedoraproject : fedoradebian : debian_linux

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-23239 | LOW Severity | CVEDatabase.com | CVEDatabase.com