Mandriva Linux Security Advisory : sudo (MDVSA-2011:018)

Medium Nessus Plugin ID 51809


The remote Mandriva Linux host is missing a security update.


Multiple vulnerabilities has been found and corrected in sudo :

A a patch for parse.c in sudo does not properly interpret a system group (aka %group) in the sudoers file during authorization decisions for a user who belongs to that group, which allows local users to leverage an applicable sudoers file and gain root privileges via a sudo command. NOTE: this vulnerability exists because of a CVE-2009-0034 regression (CVE-2011-0008).

check.c in sudo 1.7.x before 1.7.4p5, when a Runas group is configured, does not require a password for command execution that involves a gid change but no uid change, which allows local users to bypass an intended authentication requirement via the -g option to a sudo command (CVE-2011-0010).

Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: products_id=490

The updated packages have been upgraded to the latest versions (1.7.4p6) which is not affected by these issues.


Update the affected sudo package.

Plugin Details

Severity: Medium

ID: 51809

File Name: mandriva_MDVSA-2011-018.nasl

Version: $Revision: 1.9 $

Type: local

Published: 2011/01/28

Modified: 2016/03/07

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:sudo, cpe:/o:mandriva:linux:2009.0, cpe:/o:mandriva:linux:2010.0, cpe:/o:mandriva:linux:2010.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2011/01/21

Reference Information

CVE: CVE-2011-0008, CVE-2011-0010

BID: 33517, 45774

OSVDB: 51736, 70400

MDVSA: 2011:018