[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3440-1 sudo -- sudo

ID: oval:org.secpod.oval:def:602339Date: (C)2016-01-27   (M)2022-09-22
Class: PATCHFamily: unix




When sudo is configured to allow a user to edit files under a directory that they can already write to without using sudo, they can actually edit arbitrary files. Daniel Svartman reported that a configuration like this might be introduced unintentionally if the editable files are specified using wildcards, for example: operator ALL= sudoedit /home/*/*/test.txt The default behaviour of sudo has been changed so that it does not allow editing of a file in a directory that the user can write to, or that is reached by following a symlink in a directory that the user can write to. These restrictions can be disabled, but this is strongly discouraged.

Platform:
Debian 8.x
Debian 7.x
Product:
sudo
Reference:
DSA-3440-1
CVE-2015-5602
CVE    1
CVE-2015-5602
CPE    3
cpe:/o:debian:debian_linux:7.x
cpe:/o:debian:debian_linux:8.x
cpe:/a:todd_miller:sudo

© SecPod Technologies