GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Wed Mar 03, 2010 5:26 pm Post subject: [ GLSA 201003-01 ] sudo: Privilege escalation |
|
|
Gentoo Linux Security Advisory
Title: sudo: Privilege escalation (GLSA 201003-01)
Severity: high
Exploitable: local
Date: March 03, 2010
Bug(s): #306865
ID: 201003-01
Synopsis
Two vulnerabilities in sudo might allow local users to escalate privileges
and execute arbitrary code with root privileges.
Background
sudo allows a system administrator to give users the ability to run
commands as other users.
Affected Packages
Package: app-admin/sudo
Vulnerable: < 1.7.2_p4
Unaffected: >= 1.7.2_p4
Architectures: All supported architectures
Description
Multiple vulnerabilities have been discovered in sudo:
- Glenn Waller and neonsignal reported that sudo does not properly
handle access control of the "sudoedit" pseudo-command
(CVE-2010-0426). - Harald Koenig reported that sudo does not
properly set supplementary groups when using the "runas_default" option
(CVE-2010-0427).
Impact
A local attacker with privileges to use "sudoedit" or the privilege to
execute commands with the "runas_default" setting enabled could
leverage these vulnerabilities to execute arbitrary code with elevated
privileges.
Workaround
CVE-2010-0426: Revoke all "sudoedit" privileges, or use the full path
to sudoedit. CVE-2010-0427: Remove all occurrences of the
"runas_default" setting.
Resolution
All sudo users should upgrade to the latest version:
Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p4" |
References
CVE-2010-0426
CVE-2010-0427 |
|