SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Sudo Vendors:   Miller, Todd C.
(Trustix Issues Fix) Sudo Utility Has Heap Overflow That May Let Local Users Execute Arbitrary Code with Root Privileges
SecurityTracker Alert ID:  1004176
SecurityTracker URL:  http://securitytracker.com/id/1004176
CVE Reference:   CVE-2002-0184   (Links to External Site)
Updated:  Nov 20 2003
Original Entry Date:  Apr 29 2002
Impact:   Execution of arbitrary code via local system, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.6.5p2 and prior
Description:   A vulnerability has been reported in the sudo utility. A local user may be able to obtain root privileges.

Global InterSec reported an off-by-five heap overflow in 'sudo'. A local user can apparently call sudo with a specially formatted argument for the -p command line option to trigger the overflow. It is reported that sudo may not correctly allocate memory when parsing the '%h' (hostname) or '%u' (username) strings in the argument in some situations. A local user could potentially trigger the overflow and execute arbitrary code with root privileges.

The exact nature of the conditions required to exploit this flaw were not provided. However, it is reported that the compile-time options and the length of the hostname may affect whether the application is vulnerable or not.

Impact:   A local user may be able to execute arbitrary code with root privileges in certain situations.
Solution:   The vendor has released a fix packages for Trustix, available at:

<URI:http://www.trustix.net/pub/Trustix/updates/>
<URI:ftp://ftp.trustix.net/pub/Trustix/updates/>

Users of the SWUP tool can enjoy having updates automatically installed using 'swup --upgrade'.

The MD5sums of the packages are:

b7e0bb1ae875848d1083f212db8aaa4c ./1.5/SRPMS/sudo-1.6.6-1tr.src.rpm
0bb2e55703b06a958ff2016c8f639636 ./1.5/RPMS/sudo-1.6.6-1tr.i586.rpm
b7e0bb1ae875848d1083f212db8aaa4c ./1.2/SRPMS/sudo-1.6.6-1tr.src.rpm
222a5bf82392a838641b50820fb645db ./1.2/RPMS/sudo-1.6.6-1tr.i586.rpm
b7e0bb1ae875848d1083f212db8aaa4c ./1.1/SRPMS/sudo-1.6.6-1tr.src.rpm
ccfe0310894a377d49b04affa69b7cc8 ./1.1/RPMS/sudo-1.6.6-1tr.i586.rpm

Vendor URL:  www.courtesan.com/sudo/ (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Trustix)
Underlying OS Comments:  TSL 1.1, 1.2, 1.5

Message History:   This archive entry is a follow-up to the message listed below.
Apr 25 2002 Sudo Utility Has Heap Overflow That May Let Local Users Execute Arbitrary Code with Root Privileges



 Source Message Contents

Subject:  TSLSA-2002-0046 - sudo


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2002-0046

Package name:      sudo
Summary:           Minor security issue
Date:              2002-04-29
Affected versions: TSL 1.1, 1.2, 1.5

- --------------------------------------------------------------------------

Problem description:
  There was a problem in the old sudo package involving a heap overflow. In
  general heap overflows are difficult to exploit, but as this one potentially
  could lead to root-access, it should be considered a bit more critical.
  The issue is fixed upstream, and we now provide sudo version 1.6.6

Action:
  We recommend that all systems with this package installed are upgraded.
  Please note that if you do not need the functionality provided by this
  package, you may want to remove it from your system.


Location:
  All TSL updates are available from
  <URI:http://www.trustix.net/pub/Trustix/updates/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/updates/>


Automatic updates:
  Users of the SWUP tool can enjoy having updates automatically
  installed using 'swup --upgrade'.

  Get SWUP from:
  <URI:ftp://ftp.trustix.net/pub/Trustix/software/swup/>


Public testing:
  These packages have been available for public testing for some time.
  If you want to contribute by testing the various packages in the
  testing tree, please feel free to share your findings on the
  tsl-discuss mailinglist.
  The testing tree is located at
  <URI:http://www.trustix.net/pub/Trustix/testing/>
  <URI:ftp://ftp.trustix.net/pub/Trustix/testing/>
  

Questions?
  Check out our mailing lists:
  <URI:http://www.trustix.net/support/>


Verification:
  This advisory along with all TSL packages are signed with the TSL sign key.
  This key is available from:
  <URI:http://www.trustix.net/TSL-GPG-KEY>

  The advisory itself is available from the errata pages at
  <URI:http://www.trustix.net/errata/trustix-1.2/> and
  <URI:http://www.trustix.net/errata/trustix-1.5/>
  or directly at
  <URI:http://www.trustix.net/errata/misc/2002/TSL-2002-0046-sudo.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
b7e0bb1ae875848d1083f212db8aaa4c  ./1.5/SRPMS/sudo-1.6.6-1tr.src.rpm
0bb2e55703b06a958ff2016c8f639636  ./1.5/RPMS/sudo-1.6.6-1tr.i586.rpm
b7e0bb1ae875848d1083f212db8aaa4c  ./1.2/SRPMS/sudo-1.6.6-1tr.src.rpm
222a5bf82392a838641b50820fb645db  ./1.2/RPMS/sudo-1.6.6-1tr.i586.rpm
b7e0bb1ae875848d1083f212db8aaa4c  ./1.1/SRPMS/sudo-1.6.6-1tr.src.rpm
ccfe0310894a377d49b04affa69b7cc8  ./1.1/RPMS/sudo-1.6.6-1tr.i586.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE8zTj8wRTcg4BxxS0RAuteAJ40lprTbaWbiJ6Vc74SKGjSQ8g/KwCeP3vE
GXZTsPB8VGxa2ZoGdWPbvTk=
=BTRX
-----END PGP SIGNATURE-----

_______________________________________________
tsl-announce mailing list
tsl-announce@trustix.org
http://www.trustix.org/mailman/listinfo.cgi/tsl-announce


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC