Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.871687
Kategorie:Red Hat Local Security Checks
Titel:RedHat Update for sudo RHSA-2016:2593-02
Zusammenfassung:The remote host is missing an update for the 'sudo'; package(s) announced via the referenced advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'sudo'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The sudo packages contain the sudo utility
which allows system administrators to provide certain users with the permission
to execute privileged commands, which are used for system management purposes,
without having to log in as root.

Security Fix(es):

* It was discovered that the default sudo configuration preserved the value
of INPUTRC from the user's environment, which could lead to information
disclosure. A local user with sudo access to a restricted program that uses
readline could use this flaw to read content from specially formatted files
with elevated privileges provided by sudo. (CVE-2016-7091)

Note: With this update, INPUTRC was removed from the env_keep list in
/etc/sudoers to avoid having sudo preserve the value of this variable when
invoking privileged commands.

Red Hat would like to thank Grisha Levit for reporting this issue.

Additional Changes:

For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.

Affected Software/OS:
sudo on
Red Hat Enterprise Linux Server (v. 7)

Solution:
Please Install the Updated Packages.

CVSS Score:
4.9

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-7091
BugTraq ID: 92615
http://www.securityfocus.com/bid/92615
https://lists.gnu.org/archive/html/bug-readline/2016-05/msg00009.html
RedHat Security Advisories: RHSA-2016:2593
https://rhn.redhat.com/errata/RHSA-2016-2593.html
CopyrightCopyright (C) 2016 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.