Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2005-172-01 sudo


Vulnerability Assessment Details

SSA-2005-172-01 sudo

Vulnerability Assessment Summary
SSA-2005-172-01 sudo

Detailed Explanation for this Vulnerability Assessment


New Sudo packages are available for Slackware 8.1, 9.0, 9.1, 10.0,
10.1, and -current to fix a security issue. A race condition could
permit a user with Sudo rights to run arbitrary commands.

For more details, see:
http://www.courtesan.com/sudo/alerts/path_race.html




Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

SUPERMICRO X9SCM-F (LGA 1155) Micro ATX Intel Xeon E3 Server Motherboard
$50.0
SUPERMICRO X9SCM-F (LGA 1155) Micro ATX Intel Xeon E3 Server Motherboard pictureHP PROLIANT MICROSERVER G8 E3-1220LV2 2.3GHZ 4GB 2 X 1TB MIDLINE
$899.0
HP PROLIANT MICROSERVER G8 E3-1220LV2 2.3GHZ 4GB 2 X 1TB MIDLINE pictureHP PROLIANT MICROSERVER G8 CORE I3-3240 3.4GHZ 8GB 4 X 1TB MIDLINE
$1189.0
HP PROLIANT MICROSERVER G8 CORE I3-3240 3.4GHZ 8GB 4 X 1TB MIDLINE pictureHP Proliant MicroServer G7 w SSD (120GB) + HDD STORAGE (3TB + 1.5TB)
$325.0
HP Proliant MicroServer G7 w SSD (120GB) + HDD STORAGE (3TB + 1.5TB) picture


Discussions

No Discussions have been posted on this vulnerability.