diff options
author | Wesley Shields <wxs@FreeBSD.org> | 2010-04-15 20:53:03 +0000 |
---|---|---|
committer | Wesley Shields <wxs@FreeBSD.org> | 2010-04-15 20:53:03 +0000 |
commit | a0381d77dcc1aa77f9ceb7e2cd54b02087a051ca (patch) | |
tree | 783e13128197fa34397b30056e7abb518ef487e2 /security/vuxml | |
parent | 8543b91b086a5e3638c9687865cccccb0e1963f0 (diff) | |
download | ports-a0381d77dcc1aa77f9ceb7e2cd54b02087a051ca.tar.gz ports-a0381d77dcc1aa77f9ceb7e2cd54b02087a051ca.zip |
Notes
Diffstat (limited to 'security/vuxml')
-rw-r--r-- | security/vuxml/vuln.xml | 36 |
1 files changed, 36 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 99016e99b96b..355fc48f0029 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -34,6 +34,42 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1a9f678d-48ca-11df-85f8-000c29a67389"> + <topic>sudo -- Privilege escalation with sudoedit</topic> + <affects> + <package> + <name>sudo</name> + <range><lt>1.7.2.6</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Todd Miller reports:</p> + <blockquote cite=""> + <p>Sudo's command matching routine expects actual commands to include + one or more slash ('/') characters. The flaw is that sudo's path + resolution code did not add a "./" prefix to commands found in the + current working directory. This creates an ambiguity between a + "sudoedit" command found in the cwd and the "sudoedit" + pseudo-command in the sudoers file. As a result, a user may be + able to run an arbitrary command named "sudoedit" in the current + working directory. For the attack to be successful, the PATH + environment variable must include "." and may not include any other + directory that contains a "sudoedit" command.</p> + </blockquote> + </body> + </description> + <references> + <url>http://www.sudo.ws/pipermail/sudo-announce/2010-April/000093.html</url> + <url>http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html</url> + <cvename>CVE-2010-0426</cvename> + </references> + <dates> + <discovery>2010-04-09</discovery> + <entry>2010-04-15</entry> + </dates> + </vuln> + <vuln vid="3987c5d1-47a9-11df-a0d5-0016d32f24fb"> <topic>KDM local privilege escalation vulnerability</topic> <affects> |