First published: Wed Feb 24 2010(Updated: )
sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | =1.6 | |
Sudo | =1.6.1 | |
Sudo | =1.6.2 | |
Sudo | =1.6.3 | |
Sudo | =1.6.3_p1 | |
Sudo | =1.6.3_p2 | |
Sudo | =1.6.3_p3 | |
Sudo | =1.6.3_p4 | |
Sudo | =1.6.3_p5 | |
Sudo | =1.6.3_p6 | |
Sudo | =1.6.3_p7 | |
Sudo | =1.6.4_p1 | |
Sudo | =1.6.4_p2 | |
Sudo | =1.6.5_p1 | |
Sudo | =1.6.5_p2 | |
Sudo | =1.6.7_p5 | |
Sudo | =1.6.8_p1 | |
Sudo | =1.6.8_p2 | |
Sudo | =1.6.8_p5 | |
Sudo | =1.6.8_p7 | |
Sudo | =1.6.8_p8 | |
Sudo | =1.6.8_p9 | |
Sudo | =1.6.8_p12 | |
Sudo | =1.6.9_p17 | |
Sudo | =1.6.9_p18 | |
Sudo | =1.6.9_p19 | |
Sudo | =1.7.0 | |
Sudo | =1.7.1 | |
Sudo | =1.7.2 | |
Sudo | =1.7.2p1 | |
Sudo | =1.7.2p2 | |
Sudo | =1.7.2p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-0426 has a moderate severity rating, indicating potential privilege escalation for local users.
To fix CVE-2010-0426, users should upgrade to sudo version 1.6.9p21 or 1.7.2p4 or later.
CVE-2010-0426 affects sudo versions prior to 1.6.9p21 and 1.7.2p4.
The impact of CVE-2010-0426 allows local users to gain elevated privileges through crafted executable files matching pseudo-commands.
CVE-2010-0426 is a local privilege escalation vulnerability in the sudo application.