Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : sudo vulnerability (USN-928-1)

Ubuntu Security Notice (C) 2010-2014 Canonical, Inc. / NASL script (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

Valerio Costamagna discovered that sudo did not properly validate the
path for the 'sudoedit' pseudo-command when the PATH contained only a
dot ('.'). If secure_path and ignore_dot were disabled, a local
attacker could exploit this to execute arbitrary code as root if sudo
was configured to allow the attacker to use sudoedit. By default,
secure_path is used and the sudoedit pseudo-command is not used in
Ubuntu. This is a different but related issue to CVE-2010-0426.

Solution :

Update the affected sudo and / or sudo-ldap packages.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 45550 ()

Bugtraq ID: 39468

CVE ID: CVE-2010-0426