Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.68214
Kategorie:Ubuntu Local Security Checks
Titel:Ubuntu USN-956-1 (sudo)
Zusammenfassung:NOSUMMARY
Beschreibung:Description:
The remote host is missing an update to sudo
announced via advisory USN-956-1.

Details follow:

Evan Broder and Anders Kaseorg discovered that sudo did not properly
sanitize its environment when configured to use secure_path (the default in
Ubuntu). A local attacker could exploit this to execute arbitrary code as
root if sudo was configured to allow the attacker to use a program that
interpreted the PATH environment variable.

Solution:
The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
sudo 1.6.8p12-1ubuntu6.3
sudo-ldap 1.6.8p12-1ubuntu6.3

Ubuntu 8.04 LTS:
sudo 1.6.9p10-1ubuntu3.8
sudo-ldap 1.6.9p10-1ubuntu3.8

Ubuntu 9.04:
sudo 1.6.9p17-1ubuntu3.3
sudo-ldap 1.6.9p17-1ubuntu3.3

Ubuntu 9.10:
sudo 1.7.0-1ubuntu2.4
sudo-ldap 1.7.0-1ubuntu2.4

Ubuntu 10.04 LTS:
sudo 1.7.2p1-1ubuntu5.1
sudo-ldap 1.7.2p1-1ubuntu5.1

In general, a standard system update will make all the necessary changes.

http://www.securityspace.com/smysecure/catid.html?in=USN-956-1

Risk factor : High

CVSS Score:
6.2

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-1646
BugTraq ID: 40538
http://www.securityfocus.com/bid/40538
Bugtraq: 20101027 rPSA-2010-0075-1 sudo (Google Search)
http://www.securityfocus.com/archive/1/514489/100/0/threaded
Debian Security Information: DSA-2062 (Google Search)
http://www.debian.org/security/2010/dsa-2062
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/042838.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043026.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043012.html
http://security.gentoo.org/glsa/glsa-201009-03.xml
http://www.mandriva.com/security/advisories?name=MDVSA-2010:118
http://www.osvdb.org/65083
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10580
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7338
http://www.redhat.com/support/errata/RHSA-2010-0475.html
http://www.securitytracker.com/id?1024101
http://secunia.com/advisories/40002
http://secunia.com/advisories/40188
http://secunia.com/advisories/40215
http://secunia.com/advisories/40508
http://secunia.com/advisories/43068
SuSE Security Announcement: SUSE-SR:2011:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
http://www.vupen.com/english/advisories/2010/1452
http://www.vupen.com/english/advisories/2010/1478
http://www.vupen.com/english/advisories/2010/1518
http://www.vupen.com/english/advisories/2010/1519
http://www.vupen.com/english/advisories/2011/0212
CopyrightCopyright (c) 2010 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.