CVE-2013-1775
Summary
| CVE | CVE-2013-1775 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2013-03-05 21:38:56 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Apple | Mac Os X | All | All | All | All |
| Application | Todd Miller | Sudo | 1.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.1 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.2 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.2p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p7 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.4 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.4p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.5 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.7 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.7p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.8 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.8p12 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.9 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.9p20 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.9p21 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.9p22 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.9p23 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.0 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10p4 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.10p6 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p4 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p6 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.2p7 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.3b1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4p4 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.4p6 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.5 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.6p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.6p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.7 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.8 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.8p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.8p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.9 | All | All | All |
| Application | Todd Miller | Sudo | 1.7.9p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.0 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.1p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.1p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.2 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.3 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.3p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.3p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.4 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.4p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.4p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.4p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.4p4 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.4p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.5 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.5p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.5p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.5p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6p4 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.8.6p6 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| Red Hat Customer Portal | af854a3a-2127-422b-91ae-364da2661108 | rhn.redhat.com | |
| APPLE-SA-2015-08-13-2 OS X Yosemite v10.10.5 and Security Update 2015-006 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| Oracle VM Server for x86 Bulletin - July 2016 | af854a3a-2127-422b-91ae-364da2661108 | www.oracle.com | |
| APPLE-SA-2013-09-12-1 OS X Mountain Lion v10.8.5 and Security Update 2013-004 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| About the security content of OS X Yosemite v10.10.5 and Security Update 2015-006 - Apple Support | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | Vendor Advisory |
| About the security content of OS X Mountain Lion v10.8.5 and Security Update 2013-004 | af854a3a-2127-422b-91ae-364da2661108 | support.apple.com | |
| Todd Miller Sudo CVE-2013-1775 Local Authentication Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Authentication bypass when clock is reset | af854a3a-2127-422b-91ae-364da2661108 | www.sudo.ws | Vendor Advisory |
| osvdb.org/90677 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| oss-security - CVE request: sudo authentication bypass when clock is reset | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| Debian -- Security Information -- DSA-2642-1 sudo | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| sudo: ddf399e3e306 | af854a3a-2127-422b-91ae-364da2661108 | www.sudo.ws | Exploit, Patch |
| openSUSE-SU-2013:0495-1: sudo: fixed two security issues | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| USN-1754-1: Sudo vulnerability | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| The Slackware Linux Project: Slackware Security Advisories | af854a3a-2127-422b-91ae-364da2661108 | www.slackware.com | |
| sudo: ebd6cc75020f | af854a3a-2127-422b-91ae-364da2661108 | www.sudo.ws | Exploit, Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.