6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
8.6%
CentOS Errata and Security Advisory CESA-2010:0675
The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.
A flaw was found in the way sudo handled Runas specifications containing
both a user and a group list. If a local user were authorized by the
sudoers file to perform their sudo commands with the privileges of a
specified user and group, they could use this flaw to run those commands
with the privileges of either an arbitrary user or group on the system.
(CVE-2010-2956)
Red Hat would like to thank Markus Wuethrich of Swiss Post - PostFinance
for reporting this issue.
Users of sudo should upgrade to this updated package, which contains a
backported patch to correct this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2010-September/079152.html
https://lists.centos.org/pipermail/centos-announce/2010-September/079153.html
Affected packages:
sudo
Upstream details at:
https://access.redhat.com/errata/RHSA-2010:0675
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | x86_64 | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.x86_64.rpm |
CentOS | 5 | i386 | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.i386.rpm |