Unrated severityNVD Advisory· Published Apr 16, 2010· Updated Apr 29, 2026
CVE-2010-1163
CVE-2010-1163
Description
The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
Affected products
21cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*+ 20 more
- cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p12:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9_p17:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9_p18:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9_p19:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9_p20:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9_p21:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.6.9_p22:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p1:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p2:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p3:*:*:*:*:*:*:*
- cpe:2.3:a:todd_miller:sudo:1.7.2p4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
28- secunia.com/advisories/39384nvdVendor Advisory
- secunia.com/advisories/39474nvdVendor Advisory
- www.vupen.com/english/advisories/2010/0881nvdVendor Advisory
- www.vupen.com/english/advisories/2010/0895nvdVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.htmlnvd
- secunia.com/advisories/39399nvd
- secunia.com/advisories/39543nvd
- secunia.com/advisories/43068nvd
- slackware.com/security/viewer.phpnvd
- wiki.rpath.com/Advisories:rPSA-2010-0075nvd
- www.mandriva.com/security/advisoriesnvd
- www.osvdb.org/63878nvd
- www.redhat.com/support/errata/RHSA-2010-0361.htmlnvd
- www.securityfocus.com/archive/1/510827/100/0/threadednvd
- www.securityfocus.com/archive/1/510846/100/0/threadednvd
- www.securityfocus.com/archive/1/510880/100/0/threadednvd
- www.securityfocus.com/archive/1/514489/100/0/threadednvd
- www.securityfocus.com/bid/39468nvd
- www.sudo.ws/sudo/alerts/sudoedit_escalate2.htmlnvd
- www.ubuntu.com/usn/USN-928-1nvd
- www.vupen.com/english/advisories/2010/0904nvd
- www.vupen.com/english/advisories/2010/0949nvd
- www.vupen.com/english/advisories/2010/0956nvd
- www.vupen.com/english/advisories/2010/1019nvd
- www.vupen.com/english/advisories/2011/0212nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/57836nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382nvd
News mentions
0No linked articles in our index yet.