Búsqueda de    
Vulnerabilidad   
    Buscar 219043 Descripciones CVE y
99761 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.131126
Categoría:Mageia Linux Local Security Checks
Título:Mageia Linux Local Check: mgasa-2015-0443
Resumen:Mageia Linux Local Security Checks mgasa-2015-0443
Descripción:Summary:
Mageia Linux Local Security Checks mgasa-2015-0443

Vulnerability Insight:
An unauthorized privilege escalation was found in sudoedit in sudo before 1.8.15 when a user is granted with root access to modify a particular file that could be located in a subset of directories. It seems that sudoedit does not check the full path if a wildcard is used twice (e.g. /home/*/*/file.txt), allowing a malicious user to replace the file.txt real file with a symbolic link to a different location (e.g. /etc/shadow), which results in unauthorized access (CVE-2015-5602). The sudo package has been updated to version 1.8.15, which fixes this issue, and also includes many other bug fixes and changes. See the upstream change log for details.

Solution:
Update the affected packages to the latest available version.

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-5602
Debian Security Information: DSA-3440 (Google Search)
http://www.debian.org/security/2016/dsa-3440
https://www.exploit-db.com/exploits/37710/
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html
https://security.gentoo.org/glsa/201606-13
http://www.securitytracker.com/id/1034392
CopyrightCopyright (C) 2015 Eero Volotinen

Esta es sólo una de 99761 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2024 E-Soft Inc. Todos los derechos reservados.