Lucene search

K
centosCentOS ProjectCESA-2010:0675
HistorySep 12, 2010 - 4:45 p.m.

sudo security update

2010-09-1216:45:07
CentOS Project
lists.centos.org
42

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

8.6%

CentOS Errata and Security Advisory CESA-2010:0675

The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.

A flaw was found in the way sudo handled Runas specifications containing
both a user and a group list. If a local user were authorized by the
sudoers file to perform their sudo commands with the privileges of a
specified user and group, they could use this flaw to run those commands
with the privileges of either an arbitrary user or group on the system.
(CVE-2010-2956)

Red Hat would like to thank Markus Wuethrich of Swiss Post - PostFinance
for reporting this issue.

Users of sudo should upgrade to this updated package, which contains a
backported patch to correct this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-September/079152.html
https://lists.centos.org/pipermail/centos-announce/2010-September/079153.html

Affected packages:
sudo

Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0675

OSVersionArchitecturePackageVersionFilename
CentOS5x86_64sudo< 1.7.2p1-8.el5_5sudo-1.7.2p1-8.el5_5.x86_64.rpm
CentOS5i386sudo< 1.7.2p1-8.el5_5sudo-1.7.2p1-8.el5_5.i386.rpm

6.2 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

8.6%

Related for CESA-2010:0675