Description
sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
Published: 2010-02-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2006-1 New sudo packages fix several vulnerabilities
EUVD EUVD EUVD-2010-0457 sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
Ubuntu USN Ubuntu USN USN-905-1 sudo vulnerabilities
References
Link Providers
ftp://ftp.sudo.ws/pub/sudo/sudo-1.6.9p21.patch.gz cve-icon cve-icon
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570737 cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040578.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-May/040588.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html cve-icon cve-icon
http://secunia.com/advisories/38659 cve-icon cve-icon
http://secunia.com/advisories/38762 cve-icon cve-icon
http://secunia.com/advisories/38795 cve-icon cve-icon
http://secunia.com/advisories/38803 cve-icon cve-icon
http://secunia.com/advisories/38915 cve-icon cve-icon
http://secunia.com/advisories/39399 cve-icon cve-icon
http://securitytracker.com/id?1023658 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.577019 cve-icon cve-icon
http://sudo.ws/bugs/show_bug.cgi?id=389 cve-icon cve-icon
http://sudo.ws/repos/sudo/rev/88f3181692fe cve-icon cve-icon
http://sudo.ws/repos/sudo/rev/f86e1b56d074 cve-icon cve-icon
http://wiki.rpath.com/Advisories:rPSA-2010-0075 cve-icon cve-icon
http://www.debian.org/security/2010/dsa-2006 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-201003-01.xml cve-icon cve-icon
http://www.linuxquestions.org/questions/linux-security-4/the-use-of-sudoedit-command-question-785442/ cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:049 cve-icon cve-icon
http://www.securityfocus.com/archive/1/514489/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/38362 cve-icon cve-icon
http://www.sudo.ws/sudo/stable.html cve-icon cve-icon
http://www.ubuntu.com/usn/USN-905-1 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0450 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/0949 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-0426 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10814 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7238 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-0426 cve-icon
History

No history.

Subscriptions

Redhat Enterprise Linux
Todd Miller Sudo
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T00:45:12.329Z

Reserved: 2010-01-27T00:00:00.000Z

Link: CVE-2010-0426

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-02-24T18:30:00.627

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-0426

cve-icon Redhat

Severity : Important

Publid Date: 2010-02-21T00:00:00Z

Links: CVE-2010-0426 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses