Gentoo Logo

sudo: Privilege escalation

Content:

1.  Gentoo Linux Security Advisory

Version Information

Advisory Reference GLSA 201003-01 / sudo
Release Date March 03, 2010
Latest Revision March 03, 2010: 01
Impact high
Exploitable local
Package Vulnerable versions Unaffected versions Architecture(s)
app-admin/sudo < 1.7.2_p4 >= 1.7.2_p4 All supported architectures

Related bugreports: #306865

Synopsis

Two vulnerabilities in sudo might allow local users to escalate privileges and execute arbitrary code with root privileges.

2.  Impact Information

Background

sudo allows a system administrator to give users the ability to run commands as other users.

Description

Multiple vulnerabilities have been discovered in sudo:

  • Glenn Waller and neonsignal reported that sudo does not properly handle access control of the "sudoedit" pseudo-command (CVE-2010-0426).
  • Harald Koenig reported that sudo does not properly set supplementary groups when using the "runas_default" option (CVE-2010-0427).

Impact

A local attacker with privileges to use "sudoedit" or the privilege to execute commands with the "runas_default" setting enabled could leverage these vulnerabilities to execute arbitrary code with elevated privileges.

3.  Resolution Information

Workaround

CVE-2010-0426: Revoke all "sudoedit" privileges, or use the full path to sudoedit. CVE-2010-0427: Remove all occurrences of the "runas_default" setting.

Resolution

All sudo users should upgrade to the latest version:

Code Listing 3.1: Resolution

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p4"

4.  References



Print

Page updated March 03, 2010

Summary: This is a Gentoo Linux Security Advisory

Security Team
Contact Address

Donate to support our development efforts.

Copyright 2001-2014 Gentoo Foundation, Inc. Questions, Comments? Contact us.