Summary
The remote host is missing an update to sudo
announced via advisory DSA 735-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20735-1
Insight
A local user who has been granted permission to run commands via sudo could run arbitrary commands as a privileged user due to a flaw in sudo's pathname validation. This bug only affects configurations which have restricted user configurations prior to an ALL directive in the configuration file. A workaround is to move any ALL directives to the beginning of the sudoers file
see the advisory at
http://www.sudo.ws/sudo/alerts/path_race.html for more information.
For the old stable Debian distribution (woody), this problem has been fixed in version 1.6.6-1.3woody1. For the current stable distribution (sarge), this problem has been fixed in version 1.6.8p7-1.1sarge1. Note that packages are not yet ready for certain architectures these will be
released as they become available.
We recommend that you upgrade your sudo package.
Severity
Classification
-
CVE CVE-2005-1993 -
CVSS Base Score: 3.7
AV:L/AC:H/Au:N/C:P/I:P/A:P
Related Vulnerabilities