First published: Mon Aug 30 2010(Updated: )
A security flaw was found in the way Sudo performed matching for user described by a password against the list of members, allowed to run particular sudo command, when the group option was specified on the command line. If a local, unprivileged user was authorized by sudoers file to run their sudo commands with permissions of a particular group (different to their own), it could lead to privilege escalation (execution of that sudo command with permissions of privileged user account (root)). Acknowledgements: Red Hat would like to thank Markus Wuethrich of Swiss Post - PostFinance for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
CentOS Sudo |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-628628 is classified as high due to its potential impact on system security.
To fix REDHAT-BUG-628628, update to the latest version of Sudo where the vulnerability has been patched.
REDHAT-BUG-628628 affects systems using vulnerable versions of Sudo that allow improper user matching.
REDHAT-BUG-628628 is a privilege escalation vulnerability that allows unprivileged users to execute commands with elevated permissions.
The impact of REDHAT-BUG-628628 can lead to unauthorized access and execution of commands by local users.