Scientific Linux Security Update : sudo on SL5.x i386/x86_64 (20140310)

medium Nessus Plugin ID 72924

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A flaw was found in the way sudo handled its blacklist of environment variables. When the 'env_reset' option was disabled, a user permitted to run certain commands via sudo could use this flaw to run such a command with one of the blacklisted environment variables set, allowing them to run an arbitrary command with the target user's privileges. (CVE-2014-0106)

Note: This issue does not affect the default configuration of the sudo package as shipped with Scientific Linux 5.

Solution

Update the affected sudo and / or sudo-debuginfo packages.

See Also

http://www.nessus.org/u?e1352b6b

Plugin Details

Severity: Medium

ID: 72924

File Name: sl_20140310_sudo_on_SL5_x.nasl

Version: 1.8

Type: local

Agent: unix

Published: 3/11/2014

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.6

Vector: CVSS2#AV:L/AC:M/Au:S/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:sudo, p-cpe:/a:fermilab:scientific_linux:sudo-debuginfo, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/10/2014

Vulnerability Publication Date: 3/11/2014

Exploitable With

Core Impact

Reference Information

CVE: CVE-2014-0106