First published: Mon Aug 30 2010(Updated: )
A security flaw was found in the way Sudo performed matching for user described by a password against the list of members, allowed to run particular sudo command, when the group option was specified on the command line. If a local, unprivileged user was authorized by sudoers file to run their sudo commands with permissions of a particular group (different to their own), it could lead to privilege escalation (execution of that sudo command with permissions of privileged user account (root)). Acknowledgements: Red Hat would like to thank Markus Wuethrich of Swiss Post - PostFinance for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | =1.7.2p4 | |
Sudo | =1.7.0 | |
Sudo | =1.7.4p2 | |
Sudo | =1.7.1 | |
Sudo | =1.7.2p2 | |
Sudo | =1.7.2p7 | |
Sudo | =1.7.2 | |
Sudo | =1.7.4 | |
Sudo | =1.7.4p3 | |
Sudo | =1.7.3b1 | |
Sudo | =1.7.2p1 | |
Sudo | =1.7.2p3 | |
Sudo | =1.7.2p5 | |
Sudo | =1.7.4p1 | |
Sudo | =1.7.2p6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2956 has been classified as a medium severity vulnerability.
To mitigate CVE-2010-2956, update your Sudo installation to the latest version that addresses this vulnerability.
CVE-2010-2956 affects Sudo versions 1.7.0, 1.7.1, 1.7.2, and 1.7.4 up to specific patch levels.
CVE-2010-2956 allows a local, unprivileged user to escalate privileges by exploiting misconfigured sudoers rules.
As a temporary workaround for CVE-2010-2956, consider reviewing and restricting sudo permissions for unprivileged users.