Mandriva Linux Security Advisory : sudo (MDVSA-2015:126)

high Nessus Plugin ID 82379

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Updated sudo packages fix security vulnerability :

Prior to sudo 1.8.12, the TZ environment variable was passed through unchecked. Most libc tzset() implementations support passing an absolute pathname in the time zone to point to an arbitrary, user-controlled file. This may be used to exploit bugs in the C library's TZ parser or open files the user would not otherwise have access to. Arbitrary file access via TZ could also be used in a denial of service attack by reading from a file or fifo that will block (CVE-2014-9680).

The sudo package has been updated to version 1.8.12, fixing this issue and several other bugs.

Solution

Update the affected sudo and / or sudo-devel packages.

See Also

http://advisories.mageia.org/MGASA-2015-0079.html

Plugin Details

Severity: High

ID: 82379

File Name: mandriva_MDVSA-2015-126.nasl

Version: 1.4

Type: local

Published: 3/30/2015

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:sudo, p-cpe:/a:mandriva:linux:sudo-devel, cpe:/o:mandriva:business_server:2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/29/2015

Reference Information

CVE: CVE-2014-9680

MDVSA: 2015:126