CVE-2013-1775

Mac OS X Sudo Password Bypass

Title source: metasploit

Description

sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.

Exploits (5)

exploitdb WORKING POC VERIFIED
by David Kennedy (ReL1K) · pythonlocalosx
https://www.exploit-db.com/exploits/27965
exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalosx
https://www.exploit-db.com/exploits/27944
nomisec WORKING POC
by bekhzod0725 · poc
https://github.com/bekhzod0725/perl-CVE-2013-1775
github NO CODE
by gitcollect · cpoc
https://github.com/gitcollect/CVE_Exploits/tree/master/cve-2013-1775
metasploit WORKING POC NORMAL
by Todd C. Miller, joev, juan vazquez · rubypocosx
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/sudo_password_bypass.rb

Scores

EPSS 0.0813
EPSS Percentile 92.2%

Details

CWE
CWE-264
Status published
Products (50)
apple/mac_os_x < 10.10.4
todd_miller/sudo 1.6
todd_miller/sudo 1.6.1
todd_miller/sudo 1.6.2
todd_miller/sudo 1.6.2p3
todd_miller/sudo 1.6.3
todd_miller/sudo 1.6.3_p7
todd_miller/sudo 1.6.4
todd_miller/sudo 1.6.4p2
todd_miller/sudo 1.6.5
... and 40 more
Published Mar 05, 2013
Tracked Since Feb 18, 2026