FreeBSD : sudo -- Privilege escalation with sudoedit (018a84d0-2548-11df-b4a3-00e0815b8da8)

This script is Copyright (C) 2010-2014 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Todd Miller reports :

When sudo performs its command matching, there is a special case for
pseudo-commands in the sudoers file (currently, the only
pseudo-command is sudoedit). Unlike a regular command, pseudo-commands
do not begin with a slash ('/'). The flaw is that sudo's the matching
code would only check against the list of pseudo-commands if the
user-specified command also contained no slashes. As a result, if the
user ran 'sudo ./sudoedit' the normal matching code path was followed,
which uses stat(2) to verify that the user-specified command matches
the one in sudoers. In this case, it would compare the './sudoedit'
specified by the user with 'sudoedit' from the sudoers file, resulting
in a positive match.

See also :

http://www.sudo.ws/pipermail/sudo-announce/2010-February/000092.html
http://www.sudo.ws/sudo/alerts/sudoedit_escalate.html
http://www.nessus.org/u?5d02152c

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.9
(CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 44952 (freebsd_pkg_018a84d0254811dfb4a300e0815b8da8.nasl)

Bugtraq ID: 38362

CVE ID: CVE-2010-0426

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now