FreeBSD : sudo -- local race condition vulnerability (3bf157fa-e1c6-11d9-b875-0001020eed82)

Low Nessus Plugin ID 18906


The remote FreeBSD host is missing a security-related update.


Todd C. Miller reports :

A race condition in Sudo's command pathname handling prior to Sudo version 1.6.8p9 that could allow a user with Sudo privileges to run arbitrary commands.

Exploitation of the bug requires that the user be allowed to run one or more commands via Sudo and be able to create symbolic links in the filesystem. Furthermore, a sudoers entry giving another user access to the ALL pseudo-command must follow the user's sudoers entry for the race to exist.


Update the affected package.

See Also

Plugin Details

Severity: Low

ID: 18906

File Name: freebsd_pkg_3bf157fae1c611d9b8750001020eed82.nasl

Version: $Revision: 1.13 $

Type: local

Published: 2005/07/13

Modified: 2016/05/09

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 3.7

Temporal Score: 3.2

Vector: CVSS2#AV:L/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:sudo, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2005/06/20

Vulnerability Publication Date: 2005/06/20

Reference Information

CVE: CVE-2005-1993

BID: 13993