First published: Thu Feb 05 2009(Updated: )
The sudo (superuser do) utility allows system administrators to give<br>certain users the ability to run commands as root with logging.<br>A flaw was discovered in a way sudo handled group specifications in "run<br>as" lists in the sudoers configuration file. If sudo configuration allowed<br>a user to run commands as any user of some group and the user was also a<br>member of that group, sudo incorrectly allowed them to run defined commands<br>with the privileges of any system user. This gave the user unintended<br>privileges. (CVE-2009-0034)<br>Users of sudo should update to this updated package, which contains a<br>backported patch to resolve this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sudo | <1.6.9p17-3.el5_3.1 | 1.6.9p17-3.el5_3.1 |
redhat/sudo | <1.6.9p17-3.el5_3.1 | 1.6.9p17-3.el5_3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2009:0267 is classified as moderate.
RHSA-2009:0267 affects sudo versions prior to 1.6.9p17-3.el5_3.1.
To fix RHSA-2009:0267, update sudo to version 1.6.9p17-3.el5_3.1 or later.
RHSA-2009:0267 describes a flaw in the way sudo handles group specifications in the sudoers configuration.
The potential impact of RHSA-2009:0267 includes unauthorized command execution as root if the sudo configuration is exploited.