[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2010:0122-01 -- Redhat sudo

ID: oval:org.secpod.oval:def:500307Date: (C)2012-01-31   (M)2021-09-11
Class: PATCHFamily: unix




The sudo utility allows system administrators to give certain users the ability to run commands as root. A privilege escalation flaw was found in the way sudo handled the sudoedit pseudo-command. If a local user were authorized by the sudoers file to use this pseudo-command, they could possibly leverage this flaw to execute arbitrary code with the privileges of the root user. The sudo utility did not properly initialize supplementary groups when the "runas_default" option was used. If a local user were authorized by the sudoers file to perform their sudo commands under the account specified with "runas_default", they would receive the root user"s supplementary groups instead of those of the intended target user, giving them unintended privileges. Users of sudo should upgrade to this updated package, which contains backported patches to correct these issues.

Platform:
Red Hat Enterprise Linux 5
Product:
sudo
Reference:
RHSA-2010:0122-01
CVE-2010-0426
CVE-2010-0427
CVE    2
CVE-2010-0427
CVE-2010-0426
CPE    17
cpe:/a:todd_miller:sudo:1.6
cpe:/a:todd_miller:sudo:1.6.8
cpe:/a:todd_miller:sudo:1.6.7
cpe:/a:todd_miller:sudo:1.6.3
...

© SecPod Technologies