oval:org.mitre.oval:def:7238
Definition Id: oval:org.mitre.oval:def:7238 | |||
Oval ID: | oval:org.mitre.oval:def:7238 | ||
Title: | Sudo 'sudoedit' Local Privilege Escalation Vulnerability | ||
Description: | sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2010-0426 | Version: | 5 |
Platform(s): | VMWare ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:5506 | |||
Oval ID: | oval:org.mitre.oval:def:5506 | ||
Title: | VMware ESX Server 4.0 is installed | ||
Description: | The operating system installed on the system is VMware ESX Server 4.0. | ||
Family: | unix | Class: | inventory |
Reference(s): | cpe:/o:vmware:esx:4.0 | Version: | 3 |
Platform(s): | VMware ESX Server 4.0 | Product(s): | |
Definition Synopsis: | |||
Referenced By: | |||
oval:org.mitre.oval:def:7238 |