FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

CVE-2010-0426

This CVE name corresponds to:

Entered Topic
2010-03-01 sudo -- Privilege escalation with sudoedit

The following information is adapted from the Common Vulnerabilities and Exposures (CVE) project. CVE and the CVE logo are trademarks of The MITRE Corporation. CVE content is Copyright 2005, The MITRE Corporation.

Details

Type Candidate
Name CVE-2010-0426
Phase Assigned(20100127)

Description

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

References

Source Reference
BUGTRAQ 20101027 rPSA-2010-0075-1 sudo
MISC http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737
MISC http://www.linuxquestions.org/questions/linux-security-4/the-use-of-sudoedit-command-question-785442/
CONFIRM ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz
CONFIRM http://sudo.ws/bugs/show_bug.cgi?id=389
CONFIRM http://sudo.ws/repos/sudo/rev/88f3181692fe
CONFIRM http://sudo.ws/repos/sudo/rev/f86e1b56d074
CONFIRM http://www.sudo.ws/sudo/stable.html
CONFIRM http://wiki.rpath.com/Advisories:rPSA-2010-0075
DEBIAN DSA-2006
FEDORA FEDORA-2010-6701
FEDORA FEDORA-2010-6749
GENTOO GLSA-201003-01
MANDRIVA MDVSA-2010:049
SLACKWARE SSA:2010-110-01
SUSE SUSE-SR:2010:006
UBUNTU USN-905-1
BID 38362
OVAL oval:org.mitre.oval:def:10814
OVAL oval:org.mitre.oval:def:7238
SECTRACK 1023658
SECUNIA 38659
SECUNIA 38915
SECUNIA 38795
SECUNIA 38803
SECUNIA 39399
SECUNIA 38762
VUPEN ADV-2010-0450
VUPEN ADV-2010-0949