Ubuntu 1442-1: Sudo vulnerability

    Date16 May 2012
    CategoryUbuntu
    51
    Posted ByLinuxSecurity Advisories
    Sudo could allow users to run arbitrary programs as the administrator.
    ==========================================================================
    Ubuntu Security Notice USN-1442-1
    May 16, 2012
    
    sudo vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 12.04 LTS
    - Ubuntu 11.10
    - Ubuntu 11.04
    - Ubuntu 10.04 LTS
    - Ubuntu 8.04 LTS
    
    Summary:
    
    Sudo could allow users to run arbitrary programs as the administrator.
    
    Software Description:
    - sudo: Provide limited super user privileges to specific users
    
    Details:
    
    It was discovered that sudo incorrectly handled network masks when using Host
    and Host_List. A local user who is listed in sudoers may be allowed to run
    commands on unintended hosts when IPv4 network masks are used to grant access.
    A local attacker could exploit this to bypass intended access restrictions. Host
    and Host_List are not used in the default installation of Ubuntu.
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 12.04 LTS:
      sudo                            1.8.3p1-1ubuntu3.2
      sudo-ldap                       1.8.3p1-1ubuntu3.2
    
    Ubuntu 11.10:
      sudo                            1.7.4p6-1ubuntu2.1
      sudo-ldap                       1.7.4p6-1ubuntu2.1
    
    Ubuntu 11.04:
      sudo                            1.7.4p4-5ubuntu7.2
      sudo-ldap                       1.7.4p4-5ubuntu7.2
    
    Ubuntu 10.04 LTS:
      sudo                            1.7.2p1-1ubuntu5.4
      sudo-ldap                       1.7.2p1-1ubuntu5.4
    
    Ubuntu 8.04 LTS:
      sudo                            1.6.9p10-1ubuntu3.9
      sudo-ldap                       1.6.9p10-1ubuntu3.9
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      http://www.ubuntu.com/usn/usn-1442-1
      CVE-2012-2337
    
    Package Information:
      https://launchpad.net/ubuntu/+source/sudo/1.8.3p1-1ubuntu3.2
      https://launchpad.net/ubuntu/+source/sudo/1.7.4p6-1ubuntu2.1
      https://launchpad.net/ubuntu/+source/sudo/1.7.4p4-5ubuntu7.2
      https://launchpad.net/ubuntu/+source/sudo/1.7.2p1-1ubuntu5.4
      https://launchpad.net/ubuntu/+source/sudo/1.6.9p10-1ubuntu3.9
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.