RHEL 5 : sudo (RHSA-2009:0267)

Medium Nessus Plugin ID 35605


The remote Red Hat host is missing a security update.


An updated sudo package to fix a security issue is now available for Red Hat Enterprise Linux 5.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

The sudo (superuser do) utility allows system administrators to give certain users the ability to run commands as root with logging.

A flaw was discovered in a way sudo handled group specifications in 'run as' lists in the sudoers configuration file. If sudo configuration allowed a user to run commands as any user of some group and the user was also a member of that group, sudo incorrectly allowed them to run defined commands with the privileges of any system user.
This gave the user unintended privileges. (CVE-2009-0034)

Users of sudo should update to this updated package, which contains a backported patch to resolve this issue.


Update the affected sudo package.

See Also



Plugin Details

Severity: Medium

ID: 35605

File Name: redhat-RHSA-2009-0267.nasl

Version: $Revision: 1.18 $

Type: local

Agent: unix

Published: 2009/02/06

Modified: 2017/01/03

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:sudo, cpe:/o:redhat:enterprise_linux:5, cpe:/o:redhat:enterprise_linux:5.3

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/02/05

Reference Information

CVE: CVE-2009-0034, CVE-2011-0008

BID: 33517

RHSA: 2009:0267

CWE: 264