CVE-2009-0034

7.8 HIGH
Published: January 30, 2009 Modified: April 23, 2026
View on NVD

Description

parse.c in sudo 1.6.9p17 through 1.6.9p19 does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://osvdb.org/51736
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/33753
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/33840
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/33885
Source: secalert@redhat.com
Not Applicable
http://secunia.com/advisories/35766
Source: secalert@redhat.com
Not Applicable
http://wiki.rpath.com/Advisories:rPSA-2009-0021
Source: secalert@redhat.com
Broken Link
http://www.gratisoft.us/bugzilla/show_bug.cgi?id=327
Source: secalert@redhat.com
Product Release Notes
http://www.redhat.com/support/errata/RHSA-2009-0267.html
Source: secalert@redhat.com
Not Applicable
http://www.securityfocus.com/archive/1/500546/100/0/threaded
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/504849/100/0/threaded
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/33517
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021688
Source: secalert@redhat.com
Broken Link Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2009-0009.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1865
Source: secalert@redhat.com
Permissions Required
https://bugzilla.novell.com/show_bug.cgi?id=468923
Source: secalert@redhat.com
Issue Tracking Permissions Required
https://issues.rpath.com/browse/RPL-2954
Source: secalert@redhat.com
Broken Link
http://lists.vmware.com/pipermail/security-announce/2009/000060.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://osvdb.org/51736
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/33753
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/33840
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/33885
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://secunia.com/advisories/35766
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://wiki.rpath.com/Advisories:rPSA-2009-0021
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.gratisoft.us/bugzilla/show_bug.cgi?id=327
Source: af854a3a-2127-422b-91ae-364da2661108
Product Release Notes
http://www.mandriva.com/security/advisories?name=MDVSA-2009:033
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2009-0267.html
Source: af854a3a-2127-422b-91ae-364da2661108
Not Applicable
http://www.securityfocus.com/archive/1/500546/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/504849/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/33517
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021688
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.sudo.ws/cgi-bin/cvsweb/sudo/parse.c.diff?r1=1.160.2.21&r2=1.160.2.22&f=h
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vmware.com/security/advisories/VMSA-2009-0009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/1865
Source: af854a3a-2127-422b-91ae-364da2661108
Permissions Required
https://bugzilla.novell.com/show_bug.cgi?id=468923
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Permissions Required
https://issues.rpath.com/browse/RPL-2954
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link

42 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.8 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

vmware gratisoft