Rapid7 Vulnerability & Exploit Database

RHSA-2010:0475: sudo security update

Back to Search

RHSA-2010:0475: sudo security update

Severity
6
CVSS
(AV:L/AC:H/Au:N/C:C/I:C/A:C)
Published
06/07/2010
Created
07/25/2018
Added
06/16/2010
Modified
07/04/2017

Description

The sudo (superuser do) utility allows system administrators to givecertain users the ability to run commands as root.A flaw was found in the way sudo handled the presence of duplicatedenvironment variables. A local user authorized to run commands using sudocould use this flaw to set additional values for the environment variablesset by sudo, which could result in those values being used by the executedcommand instead of the values set by sudo. This could possibly lead tocertain intended restrictions being bypassed, such as the secure_pathsetting. (CVE-2010-1646)Red Hat would like to thank Anders Kaseorg and Evan Broder of Ksplice, Inc.for responsibly reporting this issue.Users of sudo should upgrade to this updated package, which contains abackported patch to correct this issue.

Solution(s)

  • redhat-upgrade-sudo

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;