FreeBSD : sudo -- Privilege escalation with sudoedit (018a84d0-2548-11df-b4a3-00e0815b8da8)

Medium Nessus Plugin ID 44952


The remote FreeBSD host is missing a security-related update.


Todd Miller reports :

When sudo performs its command matching, there is a special case for pseudo-commands in the sudoers file (currently, the only pseudo-command is sudoedit). Unlike a regular command, pseudo-commands do not begin with a slash ('/'). The flaw is that sudo's the matching code would only check against the list of pseudo-commands if the user-specified command also contained no slashes. As a result, if the user ran 'sudo ./sudoedit' the normal matching code path was followed, which uses stat(2) to verify that the user-specified command matches the one in sudoers. In this case, it would compare the './sudoedit' specified by the user with 'sudoedit' from the sudoers file, resulting in a positive match.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 44952

File Name: freebsd_pkg_018a84d0254811dfb4a300e0815b8da8.nasl

Version: $Revision: 1.10 $

Type: local

Published: 2010/03/02

Modified: 2014/11/14

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 6

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:sudo, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/03/01

Vulnerability Publication Date: 2010/01/29

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0426

BID: 38362

Secunia: 38659

CWE: 264