SuSE 11 Security Update : sudo (SAT Patch Number 2084)

medium Nessus Plugin ID 45014

Language:

Synopsis

The remote SuSE 11 host is missing a security update.

Description

This update fixes two security issues :

- Sudo failed to properly reset group permissions, when 'runas_default' option was used. If a local, unprivileged user was authorized by sudoers file to perform their sudo commands under default user account, it could lead to privilege escalation. (CVE-2010-0427 :
CVSS v2 Base Score: 6.6)

- A privilege escalation flaw was found in the way sudo used to check file paths for pseudocommands. If local, unprivileged user was authorized by sudoers file to edit one or more files, it could lead to execution of arbitrary code, with the privileges of privileged system user (root). (CVE-2010-0426 : CVSS v2 Base Score: 6.6)

Solution

Apply SAT patch number 2084.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=582555

https://bugzilla.novell.com/show_bug.cgi?id=582556

http://support.novell.com/security/cve/CVE-2010-0426.html

http://support.novell.com/security/cve/CVE-2010-0427.html

Plugin Details

Severity: Medium

ID: 45014

File Name: suse_11_sudo-100301.nasl

Version: 1.13

Type: local

Agent: unix

Published: 3/9/2010

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:11, p-cpe:/a:novell:suse_linux:11:sudo

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/1/2010

Exploitable With

Core Impact

Reference Information

CVE: CVE-2010-0426, CVE-2010-0427

CWE: 264