LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: April 7th, 2014
Linux Advisory Watch: April 4th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Ubuntu: 956-1: sudo vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Ubuntu Evan Broder and Anders Kaseorg discovered that sudo did not properlysanitize its environment when configured to use secure_path (the default inUbuntu). A local attacker could exploit this to execute arbitrary code asroot if sudo was configured to allow the attacker to use a program thatinterpreted the PATH environment variable. [More...]
===========================================================
Ubuntu Security Notice USN-956-1              June 30, 2010
sudo vulnerability
CVE-2010-1646
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
  sudo                            1.6.8p12-1ubuntu6.3
  sudo-ldap                       1.6.8p12-1ubuntu6.3

Ubuntu 8.04 LTS:
  sudo                            1.6.9p10-1ubuntu3.8
  sudo-ldap                       1.6.9p10-1ubuntu3.8

Ubuntu 9.04:
  sudo                            1.6.9p17-1ubuntu3.3
  sudo-ldap                       1.6.9p17-1ubuntu3.3

Ubuntu 9.10:
  sudo                            1.7.0-1ubuntu2.4
  sudo-ldap                       1.7.0-1ubuntu2.4

Ubuntu 10.04 LTS:
  sudo                            1.7.2p1-1ubuntu5.1
  sudo-ldap                       1.7.2p1-1ubuntu5.1

In general, a standard system update will make all the necessary changes.

Details follow:

Evan Broder and Anders Kaseorg discovered that sudo did not properly
sanitize its environment when configured to use secure_path (the default in
Ubuntu). A local attacker could exploit this to execute arbitrary code as
root if sudo was configured to allow the attacker to use a program that
interpreted the PATH environment variable.


Updated packages for Ubuntu 6.06 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3.diff.gz
      Size/MD5:    37216 36d4b120d354c87515638af637c67b0d
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3.dsc
      Size/MD5:      618 fd85854200bf0fedfd8cfc2eea79f99f
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12.orig.tar.gz
      Size/MD5:   585643 b29893c06192df6230dd5f340f3badf5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_amd64.deb
      Size/MD5:   177586 2cd655781c221cae8b6cad28940f5c0b
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_amd64.deb
      Size/MD5:   189546 e56b9addd85551a900c7c41043790cc7

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_i386.deb
      Size/MD5:   163104 b2f38f1ef9367319175c324686dd412c
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_i386.deb
      Size/MD5:   174564 e2b8a930e343743aeba947c596d1ede8

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_powerpc.deb
      Size/MD5:   171814 ef22e4eb3671266eedfb8379f00976fa
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_powerpc.deb
      Size/MD5:   183978 713c3bb97173d3a9749d7a41b2a4a050

  sparc architecture (Sun SPARC/UltraSPARC):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_sparc.deb
      Size/MD5:   167838 4444228753a954e3467eced9ac5388cb
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_sparc.deb
      Size/MD5:   180344 4387b62da168e7332b46e33fa322dd4d

Updated packages for Ubuntu 8.04 LTS:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8.diff.gz
      Size/MD5:    29555 823267afe725ef0ae810d4fc7700d6bd
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8.dsc
      Size/MD5:      702 03f53a9efbb7700134b4148bfc19a561
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10.orig.tar.gz
      Size/MD5:   579302 16db2a1213159a1fac8239eab58108f5

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_amd64.deb
      Size/MD5:   188554 4f9915f8178f0d76a869727e5b46f24c
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_amd64.deb
      Size/MD5:   200236 3d0dcf5ef68f5e1f9386b124a2d5742c

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_i386.deb
      Size/MD5:   176750 25768f74f7307dba01043312d5eb7762
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_i386.deb
      Size/MD5:   187664 bb916ab875765dd99eba9854372bf07f

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_lpia.deb
      Size/MD5:   177924 7d937eb2ec4ca7383af5f45bf00f577a
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_lpia.deb
      Size/MD5:   188644 808af9dcc20690a441ed35510748e749

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_powerpc.deb
      Size/MD5:   188840 f00f19aaae04cc80d5fe1984d822fd2c
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_powerpc.deb
      Size/MD5:   202650 e55052d973d6c2fd2043defcc282c3f5

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_sparc.deb
      Size/MD5:   182768 6e0af3cc2bc1b5f892eaab248c7ad8ec
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_sparc.deb
      Size/MD5:   193902 0c1e237c1b994c2c82bfcf3f0ef7eaa5

Updated packages for Ubuntu 9.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3.diff.gz
      Size/MD5:    26524 ec4d4eb3a0cad8e53158420c2b24e971
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3.dsc
      Size/MD5:     1098 2c73a1f6b6a18d8c201cbe3562f8e9c4
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17.orig.tar.gz
      Size/MD5:   593534 60daf18f28e2c1eb7641c4408e244110

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_amd64.deb
      Size/MD5:   191512 cf450b2ede8d4e51dce2e8c373c7388b
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_amd64.deb
      Size/MD5:   202506 a5eb0005ccfa19658f35cf731c132562

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_i386.deb
      Size/MD5:   179656 3a1893071ae30a1432b65c9324d44d91
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_i386.deb
      Size/MD5:   189098 dc1d5298fee0ce78e8848aeeff851120

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_lpia.deb
      Size/MD5:   180712 0a9c3a5d3087bdb0e2338e42a9331038
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_lpia.deb
      Size/MD5:   189918 ce218336ad2636084f85c5021001751b

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_powerpc.deb
      Size/MD5:   189010 422acec867c52e8e3f9bd56371078377
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_powerpc.deb
      Size/MD5:   201504 282cc2ca98c0ae4321f272d78fd0a18d

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_sparc.deb
      Size/MD5:   184370 06d2468d2b1c299beb7e95da9cbc2772
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_sparc.deb
      Size/MD5:   194100 69979206fc67d3b70d1639c7cf40712d

Updated packages for Ubuntu 9.10:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4.diff.gz
      Size/MD5:    24804 80718336a92f5c63f38ee7d84c8ff170
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4.dsc
      Size/MD5:     1117 0a739ae85420fc8043bc66f03a743676
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0.orig.tar.gz
      Size/MD5:   744311 5fd96bba35fe29b464f7aa6ad255f0a6

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_amd64.deb
      Size/MD5:   310494 5fb9286a8835453da39328a9ef46932a
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_amd64.deb
      Size/MD5:   334170 235e0f65990362782228dece635dee16

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_i386.deb
      Size/MD5:   297946 aa67fe2e4c89151c743a86404e473833
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_i386.deb
      Size/MD5:   319482 e5518c7a600c3f3b316e52767ef8907d

  lpia architecture (Low Power Intel Architecture):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_lpia.deb
      Size/MD5:   298134 152bfbe937de0aa1a7bb3d181700d7bb
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_lpia.deb
      Size/MD5:   319938 370ba3cd5d80883e7b8af93211756a20

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_powerpc.deb
      Size/MD5:   306170 e48e9bcc46b849c75675a84a85b07368
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_powerpc.deb
      Size/MD5:   329136 348631f216fbf1bdd7ee0249911fb4ff

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_sparc.deb
      Size/MD5:   301730 0fe061194552253d3e992c75062ff350
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_sparc.deb
      Size/MD5:   323868 304cae7b60bf4c7c77523cbb62fc9e6d

Updated packages for Ubuntu 10.04:

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1.diff.gz
      Size/MD5:    25851 33f5906cd8e8582e00e8baa1e5d54856
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1.dsc
      Size/MD5:     1131 665431dec087634bbcad17f22921f418
    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1.orig.tar.gz
      Size/MD5:   771059 4449d466a774f5ce401c9c0e3866c026

  amd64 architecture (Athlon64, Opteron, EM64T Xeon):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_amd64.deb
      Size/MD5:   326542 f751940841d09c48d1e87c768f7e9356
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_amd64.deb
      Size/MD5:   350420 88622f029bdf13205434aac8e647bd4f

  i386 architecture (x86 compatible Intel/AMD):

    http://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_i386.deb
      Size/MD5:   312350 f833abff9e23e619bb97129e9b7b9257
    http://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_i386.deb
      Size/MD5:   334338 877a883d1c886abc15b1502f95e0532b

  powerpc architecture (Apple Macintosh G3/G4/G5):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_powerpc.deb
      Size/MD5:   321274 30e33ca134b61a4e6e7952032d7e639c
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_powerpc.deb
      Size/MD5:   345158 ffff986a6af277e8035e840f922f3a16

  sparc architecture (Sun SPARC/UltraSPARC):

    http://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_sparc.deb
      Size/MD5:   318478 f77a189b478f46fd930754adee2e7b1d
    http://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_sparc.deb
      Size/MD5:   341708 4e38581147410e7ff4a61d6bbcd23bdd



-- 
Jamie Strandboge             | http://www.canonical.com

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Hackers From China Waste Little Time in Exploiting Heartbleed
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Why a hacker got paid for finding the Heartbleed bug
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.