The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for ".", which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T01:14:06.554Z
Reserved: 2010-03-29T00:00:00
Link: CVE-2010-1163

No data.

Status : Modified
Published: 2010-04-16T19:30:00.523
Modified: 2024-11-21T01:13:46.760
Link: CVE-2010-1163
