diff options
author | wxs <wxs@FreeBSD.org> | 2010-04-16 04:53:03 +0800 |
---|---|---|
committer | wxs <wxs@FreeBSD.org> | 2010-04-16 04:53:03 +0800 |
commit | fd9930563677e0f73e8096dc84c08797d6d87f9e (patch) | |
tree | e72ac2260c0d9bfca04df258539a19e232586869 /security/vuxml | |
parent | 54009ea635447f310d09055640c901cfaf9f3e9e (diff) | |
download | freebsd-ports-gnome-fd9930563677e0f73e8096dc84c08797d6d87f9e.tar.gz freebsd-ports-gnome-fd9930563677e0f73e8096dc84c08797d6d87f9e.tar.zst freebsd-ports-gnome-fd9930563677e0f73e8096dc84c08797d6d87f9e.zip |
- Document sudo privilege escalation bug. This is similar to
018a84d0-2548-11df-b4a3-00e0815b8da8.
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 99016e99b96b..355fc48f0029 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1a9f678d-48ca-11df-85f8-000c29a67389"> + <topic>sudo -- Privilege escalation with sudoedit</topic> + <affects> + <package> + <name>sudo</name> + <range><lt>1.7.2.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Todd Miller reports:</p> + <blockquote cite=""> + <p>Sudo's command matching routine expects actual commands to include + one or more slash ('/') characters. The flaw is that sudo's path + resolution code did not add a "./" prefix to commands found in the + current working directory. This creates an ambiguity between a + "sudoedit" command found in the cwd and the "sudoedit" + pseudo-command in the sudoers file. As a result, a user may be + able to run an arbitrary command named "sudoedit" in the current + working directory. For the attack to be successful, the PATH + environment variable must include "." and may not include any other + directory that contains a "sudoedit" command.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.sudo.ws/pipermail/sudo-announce/2010-April/000093.html</url> + <url>http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html</url> + <cvename>CVE-2010-0426</cvename> + </references> + <dates> + <discovery>2010-04-09</discovery> + <entry>2010-04-15</entry> + </dates> + </vuln> + <vuln vid="3987c5d1-47a9-11df-a0d5-0016d32f24fb"> <topic>KDM local privilege escalation vulnerability</topic> <affects> |