[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] sudo local root exploit



Topic
=====
local root exploit in sudo

Problem Description
===================
Sudo can be tricked into allocating less memory than it should
for the prompt and in certain conditions it is possible to exploit this
flaw to corrupt the heap in such a way that could be used to execute
arbitary commands.  Because sudo is generally suid root, this can lead
to an elevation of privilege for local users.

Affected Systems
================
sudo versions < 1.6.6

Solution
========
upgrade to sudo-1.6.6 or a patched version for your distribution

RedHat 6.x
----------
RedHat 6.x did not come with sudo, but the powertools collection coutains
a sudo package. If you use this package, you must upgrade (you find the
patched version in /vol/vol1/distrib/redhat/6.2/contrib on sphinx).

rpm -Fvh sudo-1.6.5p2-1.6x.1.i386.rpm

RedHat 7.x
----------
rpm -Fvh sudo-1.6.5p2-1.7x.1.i386.rpm

Mandrake 7.x, 8.x
-----------------
rpm -Fvh sudo-1.6.4-3.1mdk.i586.rpm

Debian 2.2 (potato)
-------------------
upgrade to sudo_1.6.2p2-2.2_i386.deb