Novell Home

CVE-2010-0426

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2010-0426 at MITRE

Description

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

NVD CVSS v2 Base Score: 6.9 (AV:L/AC:M/Au:N/C:C/I:C/A:C)

Novell/SUSE information

Note from the SUSE Security Team

Does not affect SUSE Linux Enterprise Server 9, as the sudo version there did not parse pseudocommands and so did not have the problematic code.

Novell Bugzilla entries: 582555, 582556, 588501

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise 11 Moblin 2.1 DEBUGINFO
  • sudo-debuginfo >= 1.6.9p17-21.3.1
  • sudo-debugsource >= 1.6.9p17-21.3.1
SAT Patch Nr: 2086
SUSE Linux Enterprise 11 Moblin 2.1
  • sudo >= 1.6.9p17-21.3.1
SAT Patch Nr: 2086
SUSE Linux Enterprise Server for SAP 10 SP2
  • sudo >= 1.6.8p12-18.16.2
sles10-sp2.x86
sles10-sp2.ia64
sles10-sp2.ppc
sled10-sp2.x86
sles10-sp2.x86-64
sled10-sp2.x86-64
sles10-sp2.s390x
ZYPP Patch Nr: 6891
SUSE Linux Enterprise Desktop 10 SP3 for AMD64 and Intel EM64T
SUSE Linux Enterprise Desktop 10 SP3 for x86
SUSE Linux Enterprise SDK 10 SP3
SUSE Linux Enterprise Server 10 SP3
SUSE Linux Enterprise Server for SAP 10 SP3
  • sudo >= 1.6.8p12-18.17.1
sles10-sp3.s390x
sled10-sp3.x86-64
sles10-sp3.ia64
sled10-sp3.x86
sles10-sp3.x86-64
sles10-sp3.ppc
sles10-sp3.x86
ZYPP Patch Nr: 6892
SUSE Linux Enterprise 11 Moblin 2.0
  • sudo-debuginfo >= 1.6.9p17-21.3.1
  • sudo-debugsource >= 1.6.9p17-21.3.1
SAT Patch Nr: 2085
SUSE Linux Enterprise 11 Moblin 2.0
  • sudo >= 1.6.9p17-21.3.1
SAT Patch Nr: 2085
openSUSE 11.0
  • sudo-debuginfo >= 1.6.9p15-13.6
  • sudo-debugsource >= 1.6.9p15-13.6
openSUSE 11.0
  • sudo >= 1.6.9p15-13.6
openSUSE 11.1
  • sudo-debuginfo >= 1.6.9p17-10.37.1
  • sudo-debugsource >= 1.6.9p17-10.37.1
openSUSE 11.1
  • sudo >= 1.6.9p17-10.37.1
openSUSE 11.2
  • sudo-debuginfo >= 1.7.2-2.2.1
  • sudo-debugsource >= 1.7.2-2.2.1
openSUSE 11.2
  • sudo >= 1.7.2-2.2.1
SUSE Linux Enterprise 11 GA DEBUGINFO
  • sudo-debuginfo >= 1.6.9p17-21.3.1
  • sudo-debugsource >= 1.6.9p17-21.3.1
sle11-debuginfo.x86
sle11-debuginfo.ppc
sles11.x86-64
sled11.x86-64
sle11-debuginfo.x86-64
sles11.ppc
sles11.x86
sled11.x86
sles11.s390x
sles11.ia64
sle11-debuginfo.s390x
sle11-debuginfo.ia64
SAT Patch Nr: 2084
SUSE Linux Enterprise Desktop 11 GA
SUSE Linux Enterprise Server 11 GA
  • sudo >= 1.6.9p17-21.3.1
sle11-debuginfo.x86
sle11-debuginfo.ppc
sles11.x86-64
sled11.x86-64
sle11-debuginfo.x86-64
sles11.ppc
sles11.x86
sled11.x86
sles11.s390x
sles11.ia64
sle11-debuginfo.s390x
sle11-debuginfo.ia64
SAT Patch Nr: 2084

© 2014 Novell