Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0361

Опубликовано: 20 апр. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0361: sudo security update (MODERATE)

[1.7.2p1-6]

  • added second patch for CVE-2010-0426 (#580441) Resolves: #580525

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

sudo

1.7.2p1-6.el5_5

Oracle Linux x86_64

sudo

1.7.2p1-6.el5_5

Oracle Linux i386

sudo

1.7.2p1-6.el5_5

Связанные CVE

Связанные уязвимости

ubuntu
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

redhat
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

nvd
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

debian
около 15 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does ...

github
около 3 лет назад

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.