6.2 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
The sudo (superuser do) utility is vulnerable to Privilege Escalation. A flaw was found in the way sudo handled Runas specifications containing both a user and a group list. If a local user were authorized by the sudoers file to perform their sudo commands with the privileges of a specified user and group, they could use this flaw to run those commands with the privileges of either an arbitrary user or group on the system.
lists.fedoraproject.org/pipermail/package-announce/2010-September/047516.html
lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
secunia.com/advisories/40508
secunia.com/advisories/41316
secunia.com/advisories/42787
security.gentoo.org/glsa/glsa-201009-03.xml
wiki.rpath.com/Advisories:rPSA-2010-0075
www.mandriva.com/security/advisories?name=MDVSA-2010:175
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0675.html
www.securityfocus.com/archive/1/514489/100/0/threaded
www.securityfocus.com/archive/1/515545/100/0/threaded
www.securityfocus.com/bid/43019
www.securitytracker.com/id?1024392
www.sudo.ws/sudo/alerts/runas_group.html
www.ubuntu.com/usn/USN-983-1
www.vmware.com/security/advisories/VMSA-2011-0001.html
www.vupen.com/english/advisories/2010/2312
www.vupen.com/english/advisories/2010/2318
www.vupen.com/english/advisories/2010/2320
www.vupen.com/english/advisories/2010/2358
www.vupen.com/english/advisories/2011/0025
access.redhat.com/errata/RHSA-2010:0675
bugzilla.redhat.com/show_bug.cgi?id=628628