Todd Miller Sudo本地权限提升漏洞

2008-04-09 04:15:38来源:互联网 阅读 ()

新老客户大回馈,云服务器低至5折

Todd Miller Sudo本地权限提升漏洞

发布日期:2005-10-26
更新日期:2005-10-26

受影响系统:
Todd Miller Sudo 1.6.8p9
Todd Miller Sudo 1.6.8p8
Todd Miller Sudo 1.6.8p7
Todd Miller Sudo 1.6.8p5
Todd Miller Sudo 1.6.8p1
Todd Miller Sudo 1.6.8
Todd Miller Sudo 1.6.7p5
Todd Miller Sudo 1.6.7
Todd Miller Sudo 1.6.6
Todd Miller Sudo 1.6.5p2
Todd Miller Sudo 1.6.5p1
Todd Miller Sudo 1.6.5
Todd Miller Sudo 1.6.4p2
Todd Miller Sudo 1.6.4p1
Todd Miller Sudo 1.6.4
Todd Miller Sudo 1.6.3p7
Todd Miller Sudo 1.6.3p6
Todd Miller Sudo 1.6.3p5
Todd Miller Sudo 1.6.3p4
Todd Miller Sudo 1.6.3p3
Todd Miller Sudo 1.6.3p2
Todd Miller Sudo 1.6.3p1
Todd Miller Sudo 1.6.3
Todd Miller Sudo 1.6.2
Todd Miller Sudo 1.6.1
Todd Miller Sudo 1.6
描述:
BUGTRAQ ID: 15191
CVE(CAN) ID: CVE-2005-2959

Sudo是一款允许用户以其他用户权限安全的执行命令的程序,广泛使用在Linux和Unix操作系统下。

Sudo中存在本地权限提升漏洞,有一定权限的本地用户可能利用此漏洞以高权限执行任意系统命令。

Sudo不能充分的过滤环境变量。SHELLOPTS和PS4变量都是危险的变量,但仍传递给了以特权用户运行的程序。这可能导致在执行bash脚本时以特权用户的权限执行任意命令。请注意仅有获得了受限超级用户权限的攻击者才可以利用这些漏洞。

<*来源:Tavis Ormandy (taviso@gentoo.org)

链接:http://www.debian.org/security/2005/dsa-870
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-870-1)以及相应补丁:
DSA-870-1:New sudo packages fix arbitrary command execution
链接:http://www.debian.org/security/2005/dsa-870

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4.dsc
Size/MD5 checksum: 587 c22d78e545cc41285b70e928baf5ef2a
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4.diff.gz
Size/MD5 checksum: 12353 49b036195d8797105cc48b77343409df
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6.orig.tar.gz
Size/MD5 checksum: 333074 4da4bf6cf31634cc7a17ec3b69fdc333

Alpha architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_alpha.deb
Size/MD5 checksum: 151570 03fce4fe476ae16b4672dab579d5fd69

ARM architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_arm.deb
Size/MD5 checksum: 141524 9337ba4f86b1bfc23b9c0ac43831e5b8

Intel IA-32 architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_i386.deb
Size/MD5 checksum: 134978 ad3fa7172bdf1367bcb7ffada5fe8bd1

Intel IA-64 architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_ia64.deb
Size/MD5 checksum: 172532 a37d469d4b88fbf61ffcf2bfe2ba2ac9

HP Precision architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_hppa.deb
Size/MD5 checksum: 147642 48ee191d753ce8231406383ddfeca83b

Motorola 680x0 architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_m68k.deb
Size/MD5 checksum: 132792 661352760c71a856734ed98cf59718f8

Big endian MIPS architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_mips.deb
Size/MD5 checksum: 144444 8bd20f7ef341e7b4210bf83888288817

Little endian MIPS architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_mipsel.deb
Size/MD5 checksum: 144320 65cd1110ea9d0a24cfd42a963c2e932c

PowerPC architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_powerpc.deb
Size/MD5 checksum: 140708 d46cca27fddf5ba89b3a7ccbce87bfd8

IBM S/390 architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_s390.deb
Size/MD5 checksum: 140294 c2b73dd934d2852bd97395021b82bcb1

Sun Sparc architecture:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.6-1.4_sparc.deb
Size/MD5 checksum: 143106 7fe864a335c9f438765cedb78b602695


Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.2.dsc
Size/MD5 checksum: 571 ee704f9a7147f4af70b7f98c03fe63ca
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.2.diff.gz
Size/MD5 checksum: 20291 85b39fe73ce73b17f89077f5baff1061
http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7.orig.tar.gz

标签:

版权申明:本站文章部分自网络,如有侵权,请联系:west999com@outlook.com
特别注意:本站所有转载文章言论不代表本站观点,本站所提供的摄影照片,插画,设计作品,如需使用,请与原作者联系,版权归原作者所有

上一篇:AR-Blog远程认证绕过漏洞

下一篇:SUSE Linux Permissions软件包CHKSTAT不安全权限处理漏洞