SuSE 11 Security Update : sudo (SAT Patch Number 2084)

Medium Nessus Plugin ID 45014


The remote SuSE 11 host is missing a security update.


This update fixes two security issues :

- Sudo failed to properly reset group permissions, when 'runas_default' option was used. If a local, unprivileged user was authorized by sudoers file to perform their sudo commands under default user account, it could lead to privilege escalation. (CVE-2010-0427 :
CVSS v2 Base Score: 6.6)

- A privilege escalation flaw was found in the way sudo used to check file paths for pseudocommands. If local, unprivileged user was authorized by sudoers file to edit one or more files, it could lead to execution of arbitrary code, with the privileges of privileged system user (root). (CVE-2010-0426 : CVSS v2 Base Score: 6.6)


Apply SAT patch number 2084.

See Also

Plugin Details

Severity: Medium

ID: 45014

File Name: suse_11_sudo-100301.nasl

Version: $Revision: 1.10 $

Type: local

Agent: unix

Published: 2010/03/09

Modified: 2013/10/25

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:sudo, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/03/01

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0426, CVE-2010-0427

CWE: 264