Family: SuSE Local Security Checks --> Category: infos
SUSE-SA:2005:036: sudo Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the sudo package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory SUSE-SA:2005:036 (sudo).
Sudo(8) allows the execution of commands as another user and gives the
administrator more flexibility than su(1).
A race condition in the pathname handling of sudo may allow a local user
to execute arbitrary commands. To exploit this bug some conditions need
to be fulfilled. The attacking user needs to be listed in the sudoers file,
he is able to create symbolic links in the filesystem, and a ALL alias-
command needs to follow the attackers entry.
Solution : http://www.suse.de/security/advisories/2005_36_sudo.html
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.