Subscribe via feed.

Sudo get_process_ttyname() For Linux Stack Clash

Posted by deepcore on June 20, 2017 – 5:15 pm

sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.