First published: Tue Feb 23 2010(Updated: )
Sudo failed to properly reset group permissions, when "runas_default" option was used. If a local, unprivileged user was authorized by sudoers file to perform their sudo commands under default user account, it could lead to privilege escalation. Upstream bug report: <a href="http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349">http://www.gratisoft.us/bugzilla/show_bug.cgi?id=349</a> Upstream patch: <a href="http://www.gratisoft.us/bugzilla/attachment.cgi?id=255">http://www.gratisoft.us/bugzilla/attachment.cgi?id=255</a>
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Sudo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-567622 is considered critical due to the potential for privilege escalation.
To mitigate REDHAT-BUG-567622, ensure that unprivileged users do not have authorization to run commands with Sudo using the 'runas_default' option.
REDHAT-BUG-567622 affects specific versions of Sudo where the 'runas_default' option is misconfigured.
Yes, a patch is available for REDHAT-BUG-567622 and should be applied to affected systems promptly.
Any system utilizing a vulnerable version of Sudo with improperly configured sudoers files is impacted by REDHAT-BUG-567622.