![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.51495 |
Category: | Conectiva Local Security Checks |
Title: | Conectiva Security Advisory CLA-2002:451 |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing updates announced in advisory CLA-2002:451. sudo is an utility designed to be used by administrators who wish to delegate administrative privileges to regular users for very specific commands, and without giving away the root password. Sebastian Krahmer from SuSe found a vulnerability in the sudo package which could be used by a local attacker to obtain root privileges. Versions prior to and including 1.6.3p7 remove a few potentially dangerous environment variables prior to executing a command as root, but other variables could be abused and used to obtain root privileges. One such scenario is when an unauthorized users attempts to execute sudo. This will cause sudo to execute a mailer to send a notice to the administrator, which is executed as root and with some environment variables specified by the attacker. This has been succesfully exploited with the postfix mailer in a default configuration, but other mailers and programs could be affected too. The author has released version 1.6.4 to address this problem. This version runs the mail program with a clean environment. Solution: The apt tool can be used to perform RPM package upgrades by running 'apt-get update' followed by 'apt-get upgrade' http://www.securityspace.com/smysecure/catid.html?in=CLA-2002:451 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002002 Risk factor : High |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |