First published: Mon Jul 30 2012(Updated: )
A certain Red Hat script for sudo 1.7.2 on Red Hat Enterprise Linux (RHEL) 5 allows local users to overwrite arbitrary files via a symlink attack on the /var/tmp/nsswitch.conf.bak temporary file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | =1.7.2 | |
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3440 has been classified as having a moderate severity level.
To fix CVE-2012-3440, update the sudo package to a version that does not contain the vulnerability.
CVE-2012-3440 affects users of Red Hat Enterprise Linux 5 running sudo version 1.7.2.
CVE-2012-3440 is associated with a symlink attack that allows local users to overwrite files.
The impact of CVE-2012-3440 is the potential for local users to manipulate system files and achieve unauthorized access.