SUS: Local root vulnerability
Gentoo Linux Security Advisory
||GLSA 200409-17 / SUS
||September 14, 2004
||May 22, 2006: 02
All supported architectures
SUS contains a string format bug that could lead to local privilege
SUS is a utility that allows regular users to be able to execute
certain commands as root.
Leon Juranic found a bug in the logging functionality of SUS that can
lead to local privilege escalation. A format string vulnerability
exists in the log() function due to an incorrect call to the syslog()
An attacker with local user privileges can potentially exploit this
vulnerability to gain root access.
There is no known workaround at this time.
All SUS users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=app-admin/sus-2.0.2-r1"
# emerge ">=app-admin/sus-2.0.2-r1"