Thursday, February 28, 2013

[USN-1754-1] Sudo vulnerability

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/
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=D09n
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-1754-1
February 28, 2013

sudo vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS

Summary:

Sudo could be made to run programs as the administrator without a password
prompt.

Software Description:
- sudo: Provide limited super user privileges to specific users

Details:

Marco Schoepl discovered that Sudo incorrectly handled time stamp files
when the system clock is set to epoch. A local attacker could use this
issue to run Sudo commands without a password prompt.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.10:
sudo 1.8.5p2-1ubuntu1.1
sudo-ldap 1.8.5p2-1ubuntu1.1

Ubuntu 12.04 LTS:
sudo 1.8.3p1-1ubuntu3.4
sudo-ldap 1.8.3p1-1ubuntu3.4

Ubuntu 11.10:
sudo 1.7.4p6-1ubuntu2.2
sudo-ldap 1.7.4p6-1ubuntu2.2

Ubuntu 10.04 LTS:
sudo 1.7.2p1-1ubuntu5.6
sudo-ldap 1.7.2p1-1ubuntu5.6

Ubuntu 8.04 LTS:
sudo 1.6.9p10-1ubuntu3.10
sudo-ldap 1.6.9p10-1ubuntu3.10

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1754-1
CVE-2013-1775

Package Information:
https://launchpad.net/ubuntu/+source/sudo/1.8.5p2-1ubuntu1.1
https://launchpad.net/ubuntu/+source/sudo/1.8.3p1-1ubuntu3.4
https://launchpad.net/ubuntu/+source/sudo/1.7.4p6-1ubuntu2.2
https://launchpad.net/ubuntu/+source/sudo/1.7.2p1-1ubuntu5.6
https://launchpad.net/ubuntu/+source/sudo/1.6.9p10-1ubuntu3.10

No comments:

Post a Comment