Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» OpenPKG » Sudo privilege escalation

Sudo privilege escalation

According to a vendor bug report, an incomplete blacklist vulnerability exists in the Sudo utility which can lead to a privilege escalation. The vulnerability exists in Sudo 1.6.8 and earlier and allows local users to gain privileges via the "SHELLOPTS" and "PS4" environment variables before executing a shell script on behalf of another user.

  • Vendor: OpenPKG
  • Vendor ID: SA-2006.002
  • Date: February 17, 2006


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

OpenPKG Security Advisory The OpenPKG Project
http://www.openpkg.org/security.html http://www.openpkg.org
[email protected] [email protected]
OpenPKG-SA-2006.002 18-Feb-2006
________________________________________________________________________

Package: sudo
Vulnerability: privilege escalation
OpenPKG Specific: no

Affected Releases: Affected Packages: Corrected Packages:
OpenPKG CURRENT <= sudo-1.6.8p11-20051107 >= sudo-1.6.8p12-20051109
OpenPKG 2.5 <= sudo-1.6.8p9-2.5.1 >= sudo-1.6.8p9-2.5.2
OpenPKG 2.4 <= sudo-1.6.8p8-2.4.1 >= sudo-1.6.8p8-2.4.2
OpenPKG 2.3 <= sudo-1.6.8p7-2.3.1 >= sudo-1.6.8p7-2.3.2

Description:
According to a vendor bug report [0], an incomplete blacklist
vulnerability exists in the Sudo [1] utility which can lead to a
privilege escalation. The vulnerability exists in Sudo 1.6.8 and
earlier and allows local users to gain privileges via the "SHELLOPTS"
and "PS4" environment variables before executing a shell script on
behalf of another user. The Common Vulnerabilities and Exposures (CVE)
project assigned the id CAN-2005-2959 [2] to the problem.
________________________________________________________________________

References:
[0] http://www.sudo.ws/bugs/show_bug.cgi?id=182
[1] http://www.sudo.ws/
[2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2959
________________________________________________________________________

For security reasons, this advisory was digitally signed with the
OpenPGP public key "OpenPKG " (ID 63C4CB9F) of the
OpenPKG project which you can retrieve from http://pgp.openpkg.org and
hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/
for details on how to verify the integrity of this advisory.
________________________________________________________________________

-----BEGIN PGP SIGNATURE-----
Comment: OpenPKG

iD8DBQFD9upOgHWT4GPEy58RAnVqAJ9sSSX3S2IXSkg7iuUQAh2YfJaeKQCeMR2a
Rvnep+GB3uU/2g+7Sx8/gAg=
=+cvo
-----END PGP SIGNATURE-----

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »