Upstream information

CVE-2010-1163 at MITRE

Description

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 6.9
Vector AV:L/AC:M/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Note from the SUSE Security Team

This requires the attacker being able to run 'sudoedit' already, which should probably not be allowed.

SUSE Bugzilla entry: 594738 [RESOLVED / FIXED]

SUSE Security Advisories:

  • SUSE-SR:2011:002, published Tue, 25 Jan 2011 11:00:00 +0000
  • openSUSE-SU-2011:0050-1

List of released packages

Product(s) Fixed package version(s) References
SUSE Enterprise Storage 6
SUSE Linux Enterprise Desktop 15 SP1
SUSE Linux Enterprise High Performance Computing 15 SP1
SUSE Linux Enterprise Module for Basesystem 15 SP1
SUSE Linux Enterprise Server 15 SP1
SUSE Linux Enterprise Server for SAP Applications 15 SP1
SUSE Manager Proxy 4.0
SUSE Manager Retail Branch Server 4.0
SUSE Manager Server 4.0
  • sudo >= 1.8.22-4.3.3
  • sudo-devel >= 1.8.22-4.3.3
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 SP1 GA sudo-1.8.22-4.3.3
SUSE Linux Enterprise Desktop 12 SP1
  • sudo >= 1.8.10p3-1.62
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Desktop 12 SP1 GA sudo-1.8.10p3-1.62
SUSE Linux Enterprise Software Development Kit 12 SP1 GA sudo-devel-1.8.10p3-1.62
SUSE Linux Enterprise Desktop 12 SP2
  • sudo >= 1.8.10p3-6.16
  • sudo-devel >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Desktop 12 SP2 GA sudo-1.8.10p3-6.16
SUSE Linux Enterprise Software Development Kit 12 SP2 GA sudo-devel-1.8.10p3-6.16
SUSE Linux Enterprise Desktop 12 SP3
  • sudo >= 1.8.20p2-1.3
  • sudo-devel >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Desktop 12 SP3 GA sudo-1.8.20p2-1.3
SUSE Linux Enterprise Software Development Kit 12 SP3 GA sudo-devel-1.8.20p2-1.3
SUSE Linux Enterprise Desktop 12 SP4
  • sudo >= 1.8.20p2-3.7.10
  • sudo-devel >= 1.8.20p2-3.7.10
Patchnames:
SUSE Linux Enterprise Desktop 12 SP4 GA sudo-1.8.20p2-3.7.10
SUSE Linux Enterprise Software Development Kit 12 SP4 GA sudo-devel-1.8.20p2-3.7.10
SUSE Linux Enterprise Desktop 12
  • sudo >= 1.8.10p3-1.62
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Desktop 12 GA sudo-1.8.10p3-1.62
SUSE Linux Enterprise Software Development Kit 12 GA sudo-devel-1.8.10p3-1.62
SUSE Linux Enterprise Desktop 15
SUSE Linux Enterprise High Performance Computing 15
SUSE Linux Enterprise Module for Basesystem 15
SUSE Linux Enterprise Server 15
SUSE Linux Enterprise Server for SAP Applications 15
  • sudo >= 1.8.22-2.11
  • sudo-devel >= 1.8.22-2.11
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 GA sudo-1.8.22-2.11
SUSE Linux Enterprise High Performance Computing 12 SP5
  • sudo >= 1.8.27-2.2
Patchnames:
SUSE Linux Enterprise High Performance Computing 12 SP5 GA sudo-1.8.27-2.2
SUSE Linux Enterprise Micro 6.0
  • sudo >= 1.9.15p5-1.3
Patchnames:
SUSE Linux Enterprise Micro 6.0 GA sudo-1.9.15p5-1.3
SUSE Linux Enterprise Micro 6.1
  • sudo >= 1.9.15p5-slfo.1.1_1.2
Patchnames:
SUSE Linux Enterprise Micro 6.1 GA sudo-1.9.15p5-slfo.1.1_1.2
SUSE Linux Enterprise Server 12 SP1
  • sudo >= 1.8.10p3-1.62
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Server 12 SP1 GA sudo-1.8.10p3-1.62
SUSE Linux Enterprise Software Development Kit 12 SP1 GA sudo-devel-1.8.10p3-1.62
SUSE Linux Enterprise Server 12 SP2
  • sudo >= 1.8.10p3-6.16
  • sudo-devel >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Server 12 SP2 GA sudo-1.8.10p3-6.16
SUSE Linux Enterprise Software Development Kit 12 SP2 GA sudo-devel-1.8.10p3-6.16
SUSE Linux Enterprise Server 12 SP3
  • sudo >= 1.8.20p2-1.3
  • sudo-devel >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Server 12 SP3 GA sudo-1.8.20p2-1.3
SUSE Linux Enterprise Software Development Kit 12 SP3 GA sudo-devel-1.8.20p2-1.3
SUSE Linux Enterprise Server 12 SP4
  • sudo >= 1.8.20p2-3.7.10
  • sudo-devel >= 1.8.20p2-3.7.10
Patchnames:
SUSE Linux Enterprise Server 12 SP4 GA sudo-1.8.20p2-3.7.10
SUSE Linux Enterprise Software Development Kit 12 SP4 GA sudo-devel-1.8.20p2-3.7.10
SUSE Linux Enterprise Server 12 SP5
  • sudo >= 1.8.27-2.2
  • sudo-devel >= 1.8.27-2.2
Patchnames:
SUSE Linux Enterprise Server 12 SP5 GA sudo-1.8.27-2.2
SUSE Linux Enterprise Software Development Kit 12 SP5 GA sudo-devel-1.8.27-2.2
SUSE Linux Enterprise Server 12
  • sudo >= 1.8.10p3-1.62
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Server 12 GA sudo-1.8.10p3-1.21
SUSE Linux Enterprise Software Development Kit 12 GA sudo-devel-1.8.10p3-1.62
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2
  • sudo >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 GA sudo-1.8.10p3-6.16
SUSE Linux Enterprise Server for SAP Applications 12 SP1
SUSE Linux Enterprise Software Development Kit 12 SP1
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP1 GA sudo-devel-1.8.10p3-1.62
SUSE Linux Enterprise Server for SAP Applications 12 SP2
SUSE Linux Enterprise Software Development Kit 12 SP2
  • sudo-devel >= 1.8.10p3-6.16
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP2 GA sudo-devel-1.8.10p3-6.16
SUSE Linux Enterprise Server for SAP Applications 12 SP3
SUSE Linux Enterprise Software Development Kit 12 SP3
  • sudo-devel >= 1.8.20p2-1.3
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP3 GA sudo-devel-1.8.20p2-1.3
SUSE Linux Enterprise Server for SAP Applications 12 SP4
SUSE Linux Enterprise Software Development Kit 12 SP4
  • sudo-devel >= 1.8.20p2-3.7.10
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP4 GA sudo-devel-1.8.20p2-3.7.10
SUSE Linux Enterprise Server for SAP Applications 12 SP5
SUSE Linux Enterprise Software Development Kit 12 SP5
  • sudo-devel >= 1.8.27-2.2
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 SP5 GA sudo-devel-1.8.27-2.2
SUSE Linux Enterprise Server for SAP Applications 12
SUSE Linux Enterprise Software Development Kit 12
  • sudo-devel >= 1.8.10p3-1.62
Patchnames:
SUSE Linux Enterprise Software Development Kit 12 GA sudo-devel-1.8.10p3-1.62
openSUSE Leap 15.0
  • sudo >= 1.8.22-lp150.2.6
Patchnames:
openSUSE Leap 15.0 GA sudo-1.8.22-lp150.2.6
openSUSE Tumbleweed
  • sudo >= 1.8.18p1-1.1
  • sudo-devel >= 1.8.18p1-1.1
  • sudo-test >= 1.8.18p1-1.1
Patchnames:
openSUSE-Tumbleweed-2024-10551


SUSE Timeline for this CVE

CVE page created: Fri Jun 28 07:46:31 2013
CVE page last modified: Sat Nov 23 13:15:47 2024