First published: Thu Feb 05 2009(Updated: )
The sudo (superuser do) utility allows system administrators to give<br>certain users the ability to run commands as root with logging.<br>A flaw was discovered in a way sudo handled group specifications in "run<br>as" lists in the sudoers configuration file. If sudo configuration allowed<br>a user to run commands as any user of some group and the user was also a<br>member of that group, sudo incorrectly allowed them to run defined commands<br>with the privileges of any system user. This gave the user unintended<br>privileges. (CVE-2009-0034)<br>Users of sudo should update to this updated package, which contains a<br>backported patch to resolve this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sudo | <1.6.9p17-3.el5_3.1 | 1.6.9p17-3.el5_3.1 |
redhat/sudo | <1.6.9p17-3.el5_3.1 | 1.6.9p17-3.el5_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.