SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Sudo Vendors:   sudo.ws
(Oracle Issues Fix for Oracle Linux) Sudo get_process_ttyname() Command Validation Flaw Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1038593
SecurityTracker URL:  http://securitytracker.com/id/1038593
CVE Reference:   CVE-2017-1000367, CVE-2017-1000368   (Links to External Site)
Date:  May 31 2017
Impact:   Modification of system information, Modification of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.8.6p7 through 1.8.20
Description:   A vulnerability was reported in Sudo. A local user can obtain root privileges on the target system.

A local user can issue a specially crafted sudo command to trigger a command validation flaw in the get_process_ttyname() process and cause the system to recognize the user's tty as an arbitrary file on the target system. A local user can exploit this to overwrite arbitrary files on the target system.

Systems with SELinux enabled and with sudo built with SELinux support are affected.

Qualys, Inc. reported this vulnerability.

Impact:   A local user can overwrite arbitrary files with root privileges on the target system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-1382.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-1382.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  6, 7

Message History:   This archive entry is a follow-up to the message listed below.
May 30 2017 Sudo get_process_ttyname() Command Validation Flaw Lets Local Users Obtain Root Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2017-1382 Important: Oracle Linux 6 sudo security update

Oracle Linux Security Advisory ELSA-2017-1382

http://linux.oracle.com/errata/ELSA-2017-1382.html

The following updated rpms for Oracle Linux 6 have been uploaded to the 
Unbreakable Linux Network:

i386:
sudo-1.8.6p3-28.el6_9.i686.rpm
sudo-devel-1.8.6p3-28.el6_9.i686.rpm

x86_64:
sudo-1.8.6p3-28.el6_9.x86_64.rpm
sudo-devel-1.8.6p3-28.el6_9.i686.rpm
sudo-devel-1.8.6p3-28.el6_9.x86_64.rpm


SRPMS:
http://oss.oracle.com/ol6/SRPMS-updates/sudo-1.8.6p3-28.el6_9.src.rpm



Description of changes:

[1.8.6p3-28]
- Fixes CVE-2017-1000367
   Resolves: rhbz#1455399


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC