First published: Wed Jul 11 2001(Updated: )
The default configuration of sudo in Engarde Secure Linux 1.0.1 allows any user in the admin group to run certain commands that could be leveraged to gain full root access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EngardeLinux Secure Community | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1240 is considered a high severity vulnerability due to its potential to allow unauthorized root access.
To fix CVE-2001-1240, reconfigure the sudoers file to restrict command access for users in the admin group.
CVE-2001-1240 affects users of Engarde Secure Linux version 1.0.1 that utilize the default sudo configuration.
Due to CVE-2001-1240, users in the admin group can run specific commands that may lead to full root access.
A workaround for CVE-2001-1240 includes manually modifying the sudoers file to limit the commands available to admin group users.