The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[USN-28-1] sudo vulnerability


<< Previous INDEX Search src Set bookmark Go to bookmark Next >>
Date: Wed, 17 Nov 2004 20:59:30 +0100
From: Martin Pitt <martin.pitt@canonical.com.>
To: [email protected]
Subject: [USN-28-1] sudo vulnerability
Cc: [email protected], [email protected]


--9amGYk9869ThD9tj
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline


Ubuntu Security Notice USN-28-1 November 17, 2004 sudo vulnerability http://www.sudo.ws/sudo/alerts/bash_functions.html
A security issue affects the following Ubuntu releases: Ubuntu 4.10 (Warty Warthog) The following packages are affected: sudo The problem can be corrected by upgrading the affected package to version 1.6.7p5-1ubuntu4.1. In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: Liam Helmer discovered an input validation flaw in sudo. When the standard shell "bash" starts up, it searches the environment for variables with a value beginning with "()". For each of these variables a function with the same name is created, with the function body filled in from the environment variable's value. A malicious user with sudo access to a shell script that uses bash can use this feature to substitute arbitrary commands for any non-fully-qualified programs called from the script. Therefore this flaw can lead to privilege escalation. Source archives: http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.1.diff.gz Size/MD5: 19512 8732535adda58d8421cc40dfa0d4d277 http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.1.dsc Size/MD5: 585 cad376439bd2828752b2ea6aca5ae8ca http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5.orig.tar.gz Size/MD5: 349785 55d503e5c35bf1ea83d38244e0242aaf amd64 architecture (Athlon64, Opteron, EM64T Xeon) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.1_amd64.deb Size/MD5: 155924 22253ea7307fdbab6c01e357a4dba9af i386 architecture (x86 compatible Intel/AMD) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.1_i386.deb Size/MD5: 145358 4492baa2b88e8707efac77943058cc07 powerpc architecture (Apple Macintosh G3/G4/G5) http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.7p5-1ubuntu4.1_powerpc.deb Size/MD5: 152864 18fa79642ba2ad55923a0a5f8cb771ba --9amGYk9869ThD9tj Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQFBm62iDecnbV4Fd/IRAltzAKDX8uNnuNkzk/ZEg+E88eHmTSR8kgCg9GyZ OmhahoC3dBt4QCV5KtAfUP8= =Yr/G -----END PGP SIGNATURE----- --9amGYk9869ThD9tj--

<< Previous INDEX Search src Set bookmark Go to bookmark Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру