FreeBSD : sudo -- Potential information leak in sudoedit (6193b3f6-548c-11eb-ba01-206a8a720317)

low Nessus Plugin ID 144868

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

Todd C. Miller reports :

A potential information leak in sudoedit that could be used to test for the existence of directories not normally accessible to the user in certain circumstances. When creating a new file, sudoedit checks to make sure the parent directory of the new file exists before running the editor. However, a race condition exists if the invoking user can replace (or create) the parent directory. If a symbolic link is created in place of the parent directory, sudoedit will run the editor as long as the target of the link exists.If the target of the link does not exist, an error message will be displayed. The race condition can be used to test for the existence of an arbitrary directory.
However, it _cannot_ be used to write to an arbitrary location.

Solution

Update the affected package.

See Also

https://www.sudo.ws/stable.html#1.9.5

http://www.nessus.org/u?1d8e0a96

Plugin Details

Severity: Low

ID: 144868

File Name: freebsd_pkg_6193b3f6548c11ebba01206a8a720317.nasl

Version: 1.5

Type: local

Published: 1/12/2021

Updated: 1/30/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.2

CVSS v2

Risk Factor: Low

Base Score: 1.9

Temporal Score: 1.5

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-23239

CVSS v3

Risk Factor: Low

Base Score: 2.5

Temporal Score: 2.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:sudo, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/11/2021

Vulnerability Publication Date: 1/11/2021

Reference Information

CVE: CVE-2021-23239

IAVA: 2021-A-0053