Lucene search

K
ubuntuUbuntuUSN-928-1
HistoryApr 15, 2010 - 12:00 a.m.

Sudo vulnerability

2010-04-1500:00:00
ubuntu.com
55

8 High

AI Score

Confidence

High

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.4%

Releases

  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • sudo -

Details

Valerio Costamagna discovered that sudo did not properly validate the path
for the β€˜sudoedit’ pseudo-command when the PATH contained only a dot (β€˜.’).
If secure_path and ignore_dot were disabled, a local attacker could exploit
this to execute arbitrary code as root if sudo was configured to allow the
attacker to use sudoedit. By default, secure_path is used and the sudoedit
pseudo-command is not used in Ubuntu. This is a different but related issue
to CVE-2010-0426.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchsudo-ldap<Β 1.7.0-1ubuntu2.2UNKNOWN
Ubuntu9.10noarchsudo<Β 1.7.0-1ubuntu2.2UNKNOWN
Ubuntu9.04noarchsudo-ldap<Β 1.6.9p17-1ubuntu3.2UNKNOWN
Ubuntu9.04noarchsudo<Β 1.6.9p17-1ubuntu3.2UNKNOWN
Ubuntu9.04noarchsudo<Β ldap-1.6.9p17-1ubuntu3.2UNKNOWN
Ubuntu8.10noarchsudo-ldap<Β 1.6.9p17-1ubuntu2.3UNKNOWN
Ubuntu8.10noarchsudo<Β 1.6.9p17-1ubuntu2.3UNKNOWN
Ubuntu8.04noarchsudo-ldap<Β 1.6.9p10-1ubuntu3.7UNKNOWN
Ubuntu8.04noarchsudo<Β 1.6.9p10-1ubuntu3.7UNKNOWN
Ubuntu6.06noarchsudo-ldap<Β 1.6.8p12-1ubuntu6.2UNKNOWN
Rows per page:
1-10 of 121

8 High

AI Score

Confidence

High

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

9.4%