Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.67293
Categoría:FreeBSD Local Security Checks
Título:FreeBSD Ports: sudo
Resumen:The remote host is missing an update to the system; as announced in the referenced advisory.
Descripción:Summary:
The remote host is missing an update to the system
as announced in the referenced advisory.

Vulnerability Insight:
The following package is affected: sudo

CVE-2010-1163
The command matching functionality in sudo 1.6.8 through 1.7.2p5 does
not properly handle when a file in the current working directory has
the same name as a pseudo-command in the sudoers file and the PATH
contains an entry for '.', which allows local users to execute
arbitrary commands via a Trojan horse executable, as demonstrated
using sudoedit, a different vulnerability than CVE-2010-0426.

Solution:
Update your system with the appropriate patches or
software upgrades.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-1163
20100419 sudoedit local privilege escalation through PATH manipulation
http://www.securityfocus.com/archive/1/510827/100/0/threaded
20100420 Re: sudoedit local privilege escalation through PATH manipulation
http://www.securityfocus.com/archive/1/510846/100/0/threaded
20100422 Re: sudoedit local privilege escalation through PATH manipulation
http://www.securityfocus.com/archive/1/510880/100/0/threaded
20101027 rPSA-2010-0075-1 sudo
http://www.securityfocus.com/archive/1/514489/100/0/threaded
39384
http://secunia.com/advisories/39384
39399
http://secunia.com/advisories/39399
39468
http://www.securityfocus.com/bid/39468
39474
http://secunia.com/advisories/39474
39543
http://secunia.com/advisories/39543
43068
http://secunia.com/advisories/43068
63878
http://www.osvdb.org/63878
ADV-2010-0881
http://www.vupen.com/english/advisories/2010/0881
ADV-2010-0895
http://www.vupen.com/english/advisories/2010/0895
ADV-2010-0904
http://www.vupen.com/english/advisories/2010/0904
ADV-2010-0949
http://www.vupen.com/english/advisories/2010/0949
ADV-2010-0956
http://www.vupen.com/english/advisories/2010/0956
ADV-2010-1019
http://www.vupen.com/english/advisories/2010/1019
ADV-2011-0212
http://www.vupen.com/english/advisories/2011/0212
FEDORA-2010-6756
http://lists.fedoraproject.org/pipermail/package-announce/2010-April/039986.html
MDVSA-2010:078
http://www.mandriva.com/security/advisories?name=MDVSA-2010:078
RHSA-2010:0361
http://www.redhat.com/support/errata/RHSA-2010-0361.html
SSA:2010-110-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019
SUSE-SR:2011:002
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
USN-928-1
http://www.ubuntu.com/usn/USN-928-1
http://wiki.rpath.com/Advisories:rPSA-2010-0075
http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html
oval:org.mitre.oval:def:9382
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9382
sudo-sudoefit-privilege-escalation(57836)
https://exchange.xforce.ibmcloud.com/vulnerabilities/57836
CopyrightCopyright (C) 2010 E-Soft Inc.

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.