Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.131126
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2015-0443)
Resumen:The remote host is missing an update for the 'sudo' package(s) announced via the MGASA-2015-0443 advisory.
Descripción:Summary:
The remote host is missing an update for the 'sudo' package(s) announced via the MGASA-2015-0443 advisory.

Vulnerability Insight:
An unauthorized privilege escalation was found in sudoedit in sudo before
1.8.15 when a user is granted with root access to modify a particular file
that could be located in a subset of directories. It seems that sudoedit
does not check the full path if a wildcard is used twice
(e.g. /home/*/*/file.txt), allowing a malicious user to replace the
file.txt real file with a symbolic link to a different location
(e.g. /etc/shadow), which results in unauthorized access (CVE-2015-5602).

The sudo package has been updated to version 1.8.15, which fixes this
issue, and also includes many other bug fixes and changes. See the
upstream change log for details.

Affected Software/OS:
'sudo' package(s) on Mageia 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.2

CVSS Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-5602
Debian Security Information: DSA-3440 (Google Search)
http://www.debian.org/security/2016/dsa-3440
https://www.exploit-db.com/exploits/37710/
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171024.html
http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171054.html
https://security.gentoo.org/glsa/201606-13
http://www.securitytracker.com/id/1034392
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.