First published: Fri Apr 16 2010(Updated: )
The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | =1.6.9_p18 | |
Sudo | =1.7.2p4 | |
Sudo | =1.6.8_p7 | |
Sudo | =1.7.0 | |
Sudo | =1.6.9_p22 | |
Sudo | =1.6.8_p12 | |
Sudo | =1.7.1 | |
Sudo | =1.7.2p2 | |
Sudo | =1.6.8 | |
Sudo | =1.6.8_p9 | |
Sudo | =1.7.2p1 | |
Sudo | =1.7.2p3 | |
Sudo | =1.6.8_p1 | |
Sudo | =1.6.9_p21 | |
Sudo | =1.6.9_p19 | |
Sudo | =1.6.9_p17 | |
Sudo | =1.6.9_p20 | |
Sudo | =1.6.8p7 | |
Sudo | =1.6.8_p5 | |
Sudo | =1.6.8_p8 | |
Sudo | =1.6.8_p2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1163 is considered to be of high severity due to its ability to allow local users to execute arbitrary commands.
To fix CVE-2010-1163, update your sudo version to any version later than 1.7.2p5 that is free from this vulnerability.
CVE-2010-1163 affects sudo versions from 1.6.8 to 1.7.2p5.
CVE-2010-1163 exploits the command matching functionality by allowing a file in the current directory to shadow pseudo-commands in the sudoers file.
While updating is the best option, you can mitigate risks by avoiding the use of '.' in the PATH environment variable.