Gentoo Archives: gentoo-announce

From: Alex Legler <a3li@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 201009-03 ] sudo: Privilege Escalation
Date: Tue, 07 Sep 2010 12:20:25
Message-Id: 20100907140802.1ea2e177@mail.a3li.li
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201009-03
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: sudo: Privilege Escalation
9 Date: September 07, 2010
10 Bugs: #322517, #335381
11 ID: 201009-03
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 The secure path feature and group handling in sudo allow local
19 attackers to escalate privileges.
20
21 Background
22 ==========
23
24 sudo allows a system administrator to give users the ability to run
25 commands as other users.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 app-admin/sudo < 1.7.4_p3-r1 >= 1.7.4_p3-r1
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been reported in sudo:
39
40 * Evan Broder and Anders Kaseorg of Ksplice, Inc. reported that the
41 sudo 'secure path' feature does not properly handle multiple PATH
42 variables (CVE-2010-1646).
43
44 * Markus Wuethrich of Swiss Post reported that sudo fails to restrict
45 access when using Runas groups and the group (-g) command line option
46 (CVE-2010-2956).
47
48 Impact
49 ======
50
51 A local attacker could exploit these vulnerabilities to gain the
52 ability to run certain commands with the privileges of other users,
53 including root, depending on the configuration.
54
55 Workaround
56 ==========
57
58 There is no known workaround at this time.
59
60 Resolution
61 ==========
62
63 All sudo users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.4_p3-r1"
67
68 References
69 ==========
70
71 [ 1 ] CVE-2010-1646
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1646
73 [ 2 ] CVE-2010-2956
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2956
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-201009-03.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 https://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2010 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature