6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
0.0004 Low
EPSS
Percentile
8.6%
The sudo (superuser do) utility allows system administrators to give
certain users the ability to run commands as root.
A flaw was found in the way sudo handled Runas specifications containing
both a user and a group list. If a local user were authorized by the
sudoers file to perform their sudo commands with the privileges of a
specified user and group, they could use this flaw to run those commands
with the privileges of either an arbitrary user or group on the system.
(CVE-2010-2956)
Red Hat would like to thank Markus Wuethrich of Swiss Post - PostFinance
for reporting this issue.
Users of sudo should upgrade to this updated package, which contains a
backported patch to correct this issue.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | i386 | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.i386.rpm |
RedHat | 5 | x86_64 | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.x86_64.rpm |
RedHat | 5 | ia64 | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.ia64.rpm |
RedHat | 5 | s390x | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.s390x.rpm |
RedHat | 5 | src | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.src.rpm |
RedHat | 5 | ppc | sudo | < 1.7.2p1-8.el5_5 | sudo-1.7.2p1-8.el5_5.ppc.rpm |