FreeBSD : sudo -- Flaw in Runas group matching (67b514c3-ba8f-11df-8f6e-000c29a67389)

This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Todd Miller reports :

Beginning with sudo version 1.7.0 it has been possible to grant
permission to run a command using a specified group via sudo -g option
(run as group). A flaw exists in the logic that matches Runas groups
in the sudoers file when the -u option is also specified (run as
user). This flaw results in a positive match for the user specified
via -u so long as the group specified via -g is allowed by the sudoers
file.

Exploitation of the flaw requires that Sudo be configured with sudoers
entries that contain a Runas group. Entries that do not contain a
Runas group, or only contain a Runas user are not affected.

See also :

http://www.sudo.ws/sudo/alerts/runas_group.html
http://www.nessus.org/u?71f63866

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 6.2
(CVSS2#AV:L/AC:H/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 49123 (freebsd_pkg_67b514c3ba8f11df8f6e000c29a67389.nasl)

Bugtraq ID:

CVE ID: CVE-2010-2956

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now