RHEL 2.1 / 3 / 4 : sudo (RHSA-2005:535)

Low Nessus Plugin ID 18594


The remote Red Hat host is missing a security update.


An updated sudo package is available that fixes a race condition in sudo's pathname validation.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The sudo (superuser do) utility allows system administrators to give certain users the ability to run commands as root with logging.

A race condition bug was found in the way sudo handles pathnames. It is possible that a local user with limited sudo access could create a race condition that would allow the execution of arbitrary commands as the root user. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2005-1993 to this issue.

Users of sudo should update to this updated package, which contains a backported patch and is not vulnerable to this issue.


Update the affected sudo package.

See Also




Plugin Details

Severity: Low

ID: 18594

File Name: redhat-RHSA-2005-535.nasl

Version: $Revision: 1.18 $

Type: local

Agent: unix

Published: 2005/06/29

Modified: 2016/12/28

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 3.7

Temporal Score: 3.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:sudo, cpe:/o:redhat:enterprise_linux:2.1, cpe:/o:redhat:enterprise_linux:3, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2005/06/29

Vulnerability Publication Date: 2005/06/21

Reference Information

CVE: CVE-2005-1993

BID: 13993

OSVDB: 17396

RHSA: 2005:535