How to Buy
This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing a security update.
In configurations where the ignore_dot option was set to off (the
default is on for the Scientific Linux 5 sudo package), a local user
authorized to use the sudoedit pseudo-command could possibly run
arbitrary commands with the privileges of the users sudoedit was
authorized to run as. (CVE-2010-1163)
See also :
Update the affected sudo package.
Risk factor :
Medium / CVSS Base Score : 6.9
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60784 ()
CVE ID: CVE-2010-1163
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.