Family: Debian Local Security Checks --> Category: infos
[DSA735] DSA-735-1 sudo Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
A local user who has been granted permission to run commands via sudo
could run arbitrary commands as a privileged user due to a flaw in
sudo's pathname validation. This bug only affects configurations which
have restricted user configurations prior to an ALL directive in the
configuration file. A workaround is to move any ALL directives to the
beginning of the sudoers file
see the advisory at
http://www.sudo.ws/sudo/alerts/path_race.html / for more information.
For the old stable Debian distribution (woody), this problem has been
fixed in version 1.6.6-1.3woody1.
For the current stable distribution
(sarge), this problem has been fixed in version 1.6.8p7-1.1sarge1.
Note that packages are not yet ready for certain architectures
will be released as they become available.
We recommend that you upgrade your sudo package.
Solution : http://www.debian.org/security/2005/dsa-735
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.