Upstream information

CVE-2010-1163 at MITRE

Description

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.9
Vector AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Note from the SUSE Security Team

This requires the attacker being able to run 'sudoedit' already, which should probably not be allowed.

SUSE Bugzilla entry: 594738 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 12
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Desktop 12 GA sudo
SUSE Linux Enterprise Desktop 12 SP1
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Desktop 12 SP1 GA sudo
SUSE Linux Enterprise Desktop 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA sudo
SUSE Linux Enterprise Desktop 12 SP3
  • sudo >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Desktop 12 SP3 GA sudo
SUSE Linux Enterprise Module for Basesystem 15
  • sudo >= 1.8.22-2.11
  • sudo-devel >= 1.8.22-2.11
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA sudo
SUSE Linux Enterprise Server 12
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Server 12 GA sudo
SUSE Linux Enterprise Server 12 SP1
  • sudo >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Server 12 SP1 GA sudo
SUSE Linux Enterprise Server 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA sudo
SUSE Linux Enterprise Server 12 SP3
  • sudo >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Server 12 SP3 GA sudo
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA sudo
SUSE Linux Enterprise Software Development Kit 12
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 GA sudo-devel
SUSE Linux Enterprise Software Development Kit 12 SP1
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP1 GA sudo-devel
SUSE Linux Enterprise Software Development Kit 12 SP2
  • sudo-devel >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP2 GA sudo-devel
SUSE Linux Enterprise Software Development Kit 12 SP3
  • sudo-devel >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP3 GA sudo-devel
openSUSE 11.2
  • sudo-debuginfo >= 1.7.2-2.5.1
  • sudo-debugsource >= 1.7.2-2.5.1
openSUSE 11.2
  • sudo >= 1.7.2-2.5.1
openSUSE 11.3
  • sudo-debuginfo >= 1.7.2p7-2.3.1
  • sudo-debugsource >= 1.7.2p7-2.3.1
openSUSE 11.3
  • sudo >= 1.7.2p7-2.3.1
openSUSE Leap 15.0
  • sudo >= 1.8.22-lp150.2.6
Patchnames:
openSUSE Leap 15.0 GA sudo
openSUSE Leap 42.1
  • sudo >= 1.8.10p3-3.8
Patchnames:
openSUSE Leap 42.1 GA sudo
openSUSE Leap 42.2
  • sudo >= 1.8.10p3-5.22
Patchnames:
openSUSE Leap 42.2 GA sudo
openSUSE Leap 42.3
  • sudo >= 1.8.20p2-1.3
Patchnames:
openSUSE Leap 42.3 GA sudo
openSUSE Tumbleweed
  • sudo >= 1.8.18p1-1.1
  • sudo-devel >= 1.8.18p1-1.1
  • sudo-test >= 1.8.18p1-1.1
Patchnames:
openSUSE Tumbleweed GA sudo