Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Mandrake Security Advisory MDVSA-2009:033 (sudo)
Information
Severity
Severity
Medium
Family
Family
Mandrake Local Security Checks
CVSSv2 Base
CVSSv2 Base
6.9
CVSSv2 Vector
CVSSv2 Vector
AV:L/AC:M/Au:N/C:C/I:C/A:C
Solution Type
Solution Type
Vendor Patch
Created
Created
15 years ago
Modified
Modified
6 years ago
Summary
The remote host is missing an update to sudo announced via advisory MDVSA-2009:033.
Insight
Insight
A vulnerability has been identified in sudo which allowed - depending on the sudoers rules - a sudo-user to execute arbitrary shell commands as root (CVE-2009-0034). The updated packages have been patched to prevent this. Affected: 2008.0, 2008.1, 2009.0
Solution
Solution
To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. https://secure1.securityspace.com/smysecure/catid.html?in=MDVSA-2009:033