The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2010-04-16T19:00:00
Updated: 2018-10-10T18:57:01
Reserved: 2010-03-29T00:00:00
Link: CVE-2010-1163
JSON object: View
NVD Information
Status : Modified
Published: 2010-04-16T19:30:00.523
Modified: 2018-10-10T19:55:54.017
Link: CVE-2010-1163
JSON object: View
Redhat Information
No data.
CWE