From a24567fbc43f221b14e805f9bc0b7c6d16911c46 Mon Sep 17 00:00:00 2001 From: Alex Legler Date: Sun, 8 Mar 2015 22:02:38 +0100 Subject: Import existing advisories --- glsa-201401-23.xml | 68 ++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 68 insertions(+) create mode 100644 glsa-201401-23.xml (limited to 'glsa-201401-23.xml') diff --git a/glsa-201401-23.xml b/glsa-201401-23.xml new file mode 100644 index 00000000..22ceb2ac --- /dev/null +++ b/glsa-201401-23.xml @@ -0,0 +1,68 @@ + + + + + + sudo: Privilege escalation + Multiple vulnerabilities have been found in sudo which could result + in privilege escalation. + + sudo + January 21, 2014 + January 21, 2014: 1 + 459722 + local + + + 1.8.6_p7 + 1.8.6_p7 + + + +

sudo allows a system administrator to give users the ability to run + commands as other users. Access to commands may also be granted on a + range to hosts. +

+
+ +

Multiple vulnerabilities have been found in sudo:

+ +
    +
  • sudo does not correctly validate the controlling terminal on a system + without /proc or when the tty_tickets option is enabled. +
  • +
  • sudo does not properly handle the clock when it is set to the epoch.
  • +
+
+ +

A local attacker with sudo privileges could connect to the stdin, + stdout, and stderr of the terminal of a user who has authenticated with + sudo, allowing the attacker to hijack the authorization of the other + user. Additionally, a local or physically proximate attacker could set + the system clock to the epoch, bypassing time restrictions on sudo + authentication. +

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.6_p7" + + +
+ + CVE-2013-1775 + CVE-2013-1776 + CVE-2013-2776 + CVE-2013-2777 + + ackle + + creffett + +
-- cgit v1.2.3-65-gdbad