Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.10.2015.0079
Category:Mageia Linux Local Security Checks
Title:Mageia: Security Advisory (MGASA-2015-0079)
Summary:The remote host is missing an update for the 'sudo' package(s) announced via the MGASA-2015-0079 advisory.
Description:Summary:
The remote host is missing an update for the 'sudo' package(s) announced via the MGASA-2015-0079 advisory.

Vulnerability Insight:
Updated sudo packages fix security vulnerability:

Prior to sudo 1.8.12, the TZ environment variable was passed through
unchecked. Most libc tzset() implementations support passing an absolute
pathname in the time zone to point to an arbitrary, user-controlled file. This
may be used to exploit bugs in the C library's TZ parser or open files the
user would not otherwise have access to. Arbitrary file access via TZ could
also be used in a denial of service attack by reading from a file or fifo that
will block (CVE-2014-9680).

The sudo package has been updated to version 1.8.12, fixing this issue and
several other bugs.

Affected Software/OS:
'sudo' package(s) on Mageia 4.

Solution:
Please install the updated package(s).

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-9680
https://security.gentoo.org/glsa/201504-02
http://openwall.com/lists/oss-security/2014/10/15/24
RedHat Security Advisories: RHSA-2015:1409
http://rhn.redhat.com/errata/RHSA-2015-1409.html
http://www.securitytracker.com/id/1033158
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.