openSUSE Security Update : sudo (sudo-2083)

medium Nessus Plugin ID 45012

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update fixes two security issues :

- CVE-2010-0427:CVSS v2 Base Score: 6.6 Sudo failed to properly reset group permissions, when 'runas_default' option was used. If a local, unprivileged user was authorized by sudoers file to perform their sudo commands under default user account, it could lead to privilege escalation CVE-2010-0426:CVSS v2 Base Score:
6.6 A privilege escalation flaw was found in the way sudo used to check file paths for pseudocommands. If local, unprivileged user was authorized by sudoers file to edit one or more files, it could lead to execution of arbitrary code, with the privileges of privileged system user (root).

Solution

Update the affected sudo package.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=582555

https://bugzilla.novell.com/show_bug.cgi?id=582556

Plugin Details

Severity: Medium

ID: 45012

File Name: suse_11_1_sudo-100301.nasl

Version: 1.10

Type: local

Agent: unix

Published: 3/9/2010

Updated: 1/14/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:sudo, cpe:/o:novell:opensuse:11.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/1/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0426, CVE-2010-0427

CWE: 264