SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Sudo Vendors:   sudo.ws
(Oracle Issues Fix for Oracle Linux) Sudo get_process_ttyname() Command Validation Flaw Lets Local Users Obtain Root Privileges
SecurityTracker Alert ID:  1038608
SecurityTracker URL:  http://securitytracker.com/id/1038608
CVE Reference:   CVE-2017-1000367, CVE-2017-1000368   (Links to External Site)
Date:  Jun 2 2017
Impact:   Modification of system information, Modification of user information, Root access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.8.6p7 through 1.8.20
Description:   A vulnerability was reported in Sudo. A local user can obtain root privileges on the target system.

A local user can issue a specially crafted sudo command to trigger a command validation flaw in the get_process_ttyname() process and cause the system to recognize the user's tty as an arbitrary file on the target system. A local user can exploit this to overwrite arbitrary files on the target system.

Systems with SELinux enabled and with sudo built with SELinux support are affected.

Qualys, Inc. reported this vulnerability.

Impact:   A local user can overwrite arbitrary files with root privileges on the target system.
Solution:   Oracle has issued a fix.

The Oracle Linux advisory is available at:

http://linux.oracle.com/errata/ELSA-2017-1381.html

Vendor URL:  linux.oracle.com/errata/ELSA-2017-1381.html (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Oracle)
Underlying OS Comments:  5

Message History:   This archive entry is a follow-up to the message listed below.
May 30 2017 Sudo get_process_ttyname() Command Validation Flaw Lets Local Users Obtain Root Privileges



 Source Message Contents

Subject:  [El-errata] ELSA-2017-1381 Important: Oracle Linux 5 sudo security update

Oracle Linux Security Advisory ELSA-2017-1381

http://linux.oracle.com/errata/ELSA-2017-1381.html

The following updated rpms for Oracle Linux 5 have been uploaded to the 
Unbreakable Linux Network:

i386:
sudo-1.7.2p1-29.0.1.el5_10.i386.rpm

x86_64:
sudo-1.7.2p1-29.0.1.el5_10.x86_64.rpm

ia64:
sudo-1.7.2p1-29.0.1.el5_10.ia64.rpm


SRPMS:
http://oss.oracle.com/ol5/SRPMS-updates/sudo-1.7.2p1-29.0.1.el5_10.src.rpm



Description of changes:

[1.7.2p1-29.0.1]
- Fix CVE-2017-1000367


_______________________________________________
El-errata mailing list
El-errata@oss.oracle.com
https://oss.oracle.com/mailman/listinfo/el-errata
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC