Ubuntu 6.06 LTS / 8.04 LTS / 8.10 / 9.04 / 9.10 : sudo vulnerability (USN-928-1)

Ubuntu Security Notice (C) 2010-2016 Canonical, Inc. / NASL script (C) 2010-2016 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related

Description :

Valerio Costamagna discovered that sudo did not properly validate the
path for the 'sudoedit' pseudo-command when the PATH contained only a
dot ('.'). If secure_path and ignore_dot were disabled, a local
attacker could exploit this to execute arbitrary code as root if sudo
was configured to allow the attacker to use sudoedit. By default,
secure_path is used and the sudoedit pseudo-command is not used in
Ubuntu. This is a different but related issue to CVE-2010-0426.

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected sudo and / or sudo-ldap packages.

Risk factor :

Medium / CVSS Base Score : 6.9
CVSS Temporal Score : 6.0
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 45550 ()

Bugtraq ID: 39468

CVE ID: CVE-2010-0426

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now