Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.
A local user can exploit a temporary file symbolic link flaw in the %postun script to overwrite arbitrary files or modify the contents of the "/etc/nsswitch.conf" file when the sudo package is upgraded or removed. This can be exploited to gain elevated privileges on the target system.
A vulnerability was reported in Sudo on Red Hat Enterprise Linux. A local user can obtain elevated privileges on the target system.
The vendor has issued a fix. Updates from the Red Hat Network