Summary
The remote host is missing an update to sudo
announced via advisory DSA 596-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20596-2
Insight
This update removes the debug output which was left over in the update from DSA 596-1. For completeness below is the original advisory text:
Liam Helmer noticed that sudo, a program that provides limited super user privileges to specific users, does not clean the environment sufficiently. Bash functions and the CDPATH variable are still passed through to the program running as privileged user, leaving possibilities to overload system routines. These vulnerabilities can only be exploited by users who have been granted limited super user privileges.
For the stable distribution (woody) these problems have been fixed in version 1.6.6-1.3.
For the unstable distribution (sid) these problems have been fixed in version 1.6.8p3.
We recommend that you upgrade your sudo package.
Severity
Classification
-
CVE CVE-2004-1051 -
CVSS Base Score: 7.2
AV:L/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities