Ubuntu Security Notice (C) 2010-2013 Canonical, Inc. / NASL script (C) 2010-2013 Tenable Network Security, Inc.
The remote Ubuntu host is missing one or more security-related patches.
Valerio Costamagna discovered that sudo did not properly validate the
path for the 'sudoedit' pseudo-command when the PATH contained only a
dot ('.'). If secure_path and ignore_dot were disabled, a local
attacker could exploit this to execute arbitrary code as root if sudo
was configured to allow the attacker to use sudoedit. By default,
secure_path is used and the sudoedit pseudo-command is not used in
Ubuntu. This is a different but related issue to CVE-2010-0426.
Update the affected sudo and / or sudo-ldap packages.
Risk factor :
Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 5.7
Public Exploit Available : true