openSUSE Security Update : sudo (sudo-2083)

Medium Nessus Plugin ID 45011


The remote openSUSE host is missing a security update.


This update fixes two security issues :

- CVE-2010-0427:CVSS v2 Base Score: 6.6 Sudo failed to properly reset group permissions, when 'runas_default' option was used. If a local, unprivileged user was authorized by sudoers file to perform their sudo commands under default user account, it could lead to privilege escalation CVE-2010-0426:CVSS v2 Base Score:
6.6 A privilege escalation flaw was found in the way sudo used to check file paths for pseudocommands. If local, unprivileged user was authorized by sudoers file to edit one or more files, it could lead to execution of arbitrary code, with the privileges of privileged system user (root).


Update the affected sudo package.

See Also

Plugin Details

Severity: Medium

ID: 45011

File Name: suse_11_0_sudo-100301.nasl

Version: $Revision: 1.7 $

Type: local

Agent: unix

Published: 2010/03/09

Modified: 2014/06/13

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:sudo, cpe:/o:novell:opensuse:11.0

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/03/01

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0426, CVE-2010-0427

CWE: 264