[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[linux-security] sudo local root exploit
- To: linux-security
- Subject: [linux-security] sudo local root exploit
- From: Martin Siegert <siegert@sfu.ca>
- Date: Mon, 29 Apr 2002 13:32:56 -0700
- User-Agent: Mutt/1.2.5.1i
Topic
=====
local root exploit in sudo
Problem Description
===================
Sudo can be tricked into allocating less memory than it should
for the prompt and in certain conditions it is possible to exploit this
flaw to corrupt the heap in such a way that could be used to execute
arbitary commands. Because sudo is generally suid root, this can lead
to an elevation of privilege for local users.
Affected Systems
================
sudo versions < 1.6.6
Solution
========
upgrade to sudo-1.6.6 or a patched version for your distribution
RedHat 6.x
----------
RedHat 6.x did not come with sudo, but the powertools collection coutains
a sudo package. If you use this package, you must upgrade (you find the
patched version in /vol/vol1/distrib/redhat/6.2/contrib on sphinx).
rpm -Fvh sudo-1.6.5p2-1.6x.1.i386.rpm
RedHat 7.x
----------
rpm -Fvh sudo-1.6.5p2-1.7x.1.i386.rpm
Mandrake 7.x, 8.x
-----------------
rpm -Fvh sudo-1.6.4-3.1mdk.i586.rpm
Debian 2.2 (potato)
-------------------
upgrade to sudo_1.6.2p2-2.2_i386.deb