---------------------------------------------------------------------- Secunia CSI + Microsoft SCCM ----------------------- = Extensive Patch Management http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ ---------------------------------------------------------------------- TITLE: sudo "sudoedit" Privilege Escalation Security Issue SECUNIA ADVISORY ID: SA39384 VERIFY ADVISORY: http://secunia.com/advisories/39384/ DESCRIPTION: A security issue has been reported in sudo, which can be exploited by malicious, local users to gain escalated privileges. The security issue is caused due to an error within the command matching functionality, which can be exploited to run a "sudoedit" executable within the current working directory. Successful exploitation may allow the execution of arbitrary code with escalated privileges, but requires that the attacker is allowed to use sudo's "sudoedit" pseudo-command, that the PATH environment variable contains "." while the directories do not contain any other "sudoedit" executable, and that the "ignore_dot" or "secure_path" options are disabled. This is related to security issue #1 in: SA38659 SOLUTION: Update to version 1.6.9p22 and 1.7.2p6. PROVIDED AND/OR DISCOVERED BY: The vendor credits Valerio Costamagna. CHANGELOG: 2010-04-16: Added CVE reference. ORIGINAL ADVISORY: http://www.sudo.ws/sudo/alerts/sudoedit_escalate2.html OTHER REFERENCES: SA38659: http://secunia.com/advisories/38659/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------