| Severity : |
Medium
|
| Published : |
2010-04-16
|
| Modified : |
2011-02-17
|
| Base Score : |
6.9
|
| Details : |
The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
|
| Product/Version : |
Pro 5.0
CGE 5.x
Mobilinux 5.x
Mobilinux 5.0.24
MVL 5 Atom
Pro 5.0.24
MVL 5 OMAP3
MVL 5 OMAP3530
Pro 4.x
CGE 4.x
Mobilinux 4.x
Carrier Grade CGE 6.0
|
|