Public Date:
567337: CVE-2010-0426 sudo: sudoedit option can possibly allow for arbitrary code execution

The MITRE CVE dictionary describes this issue as:

sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.

Find out more about CVE-2010-0426 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue was addressed in Red Hat Enterprise Linux 5 via:

It did not affect the versions of the sudo package as shipped with Red Hat Enterprise Linux 3 and 4.

CVSS v2 metrics

Base Score 6.6
Base Metrics AV:L/AC:M/Au:S/C:C/I:C/A:C
Access Vector Local
Access Complexity Medium
Authentication Single
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (sudo) RHSA-2010:0122 2010-02-26
Last Modified

CVE description copyright © 2017, The MITRE Corporation