![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.55745 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-870-1) |
Summary: | The remote host is missing an update for the Debian 'sudo' package(s) announced via the DSA-870-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'sudo' package(s) announced via the DSA-870-1 advisory. Vulnerability Insight: Tavis Ormandy noticed that sudo, a program that provides limited super user privileges to specific users, does not clean the environment sufficiently. The SHELLOPTS and PS4 variables are dangerous and are still passed through to the program running as privileged user. This can result in the execution of arbitrary commands as privileged user when a bash script is executed. These vulnerabilities can only be exploited by users who have been granted limited super user privileges. For the old stable distribution (woody) this problem has been fixed in version 1.6.6-1.4. For the stable distribution (sarge) this problem has been fixed in version 1.6.8p7-1.2. For the unstable distribution (sid) this problem has been fixed in version 1.6.8p9-3. We recommend that you upgrade your sudo package. Affected Software/OS: 'sudo' package(s) on Debian 3.0, Debian 3.1. Solution: Please install the updated package(s). CVSS Score: 4.6 CVSS Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2005-2959 http://lists.apple.com/archives/security-announce/2007/Mar/msg00002.html BugTraq ID: 15191 http://www.securityfocus.com/bid/15191 Cert/CC Advisory: TA07-072A http://www.us-cert.gov/cas/techalerts/TA07-072A.html Debian Security Information: DSA-870 (Google Search) http://www.debian.org/security/2005/dsa-870 http://www.mandriva.com/security/advisories?name=MDKSA-2005:201 http://www.openpkg.org/security/OpenPKG-SA-2006.002-sudo.html http://secunia.com/advisories/17318 http://secunia.com/advisories/17322 http://secunia.com/advisories/17345 http://secunia.com/advisories/17390 http://secunia.com/advisories/17666 http://secunia.com/advisories/18549 http://secunia.com/advisories/24479 SuSE Security Announcement: SUSE-SR:2005:025 (Google Search) http://www.securityfocus.com/advisories/9643 SuSE Security Announcement: SUSE-SR:2006:002 (Google Search) http://www.novell.com/linux/security/advisories/2006_02_sr.html https://usn.ubuntu.com/213-1/ http://www.vupen.com/english/advisories/2007/0930 |
Copyright | Copyright (C) 2008 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |