Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 735-1 (sudo)

Information

Severity

Severity

Low

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

3.7

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:H/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

14 years ago

Modified

Modified

5 years ago

Summary

The remote host is missing an update to sudo announced via advisory DSA 735-1.

Insight

Insight

A local user who has been granted permission to run commands via sudo could run arbitrary commands as a privileged user due to a flaw in sudo's pathname validation. This bug only affects configurations which have restricted user configurations prior to an ALL directive in the configuration file. A workaround is to move any ALL directives to the beginning of the sudoers file see the advisory at http://www.sudo.ws/sudo/alerts/path_race.html for more information. For the old stable Debian distribution (woody), this problem has been fixed in version 1.6.6-1.3woody1. For the current stable distribution (sarge), this problem has been fixed in version 1.6.8p7-1.1sarge1. Note that packages are not yet ready for certain architectures these will be released as they become available. We recommend that you upgrade your sudo package.

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20735-1

Common Vulnerabilities and Exposures (CVE)