Revision Date: | 2013-04-29 | Version: | 12 | Title: | sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory. | Description: | sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory. | Family: | unix | Class: | vulnerability | Status: | ACCEPTED | Reference(s): | CVE-2010-0426
| Platform(s): | CentOS Linux 5 Oracle Linux 5 Red Hat Enterprise Linux 5
| Product(s): | | Definition Synopsis | RHEL5, CentOS5 or Oracle Linux 5 The operating system installed on the system is Red Hat Enterprise Linux 5
OR The operating system installed on the system is CentOS Linux 5.x
OR Oracle Linux 5.x
AND sudo is earlier than 0:1.6.9p17-6.el5_4
|
|