Lucene search

K
amazonAmazonALAS-2013-259
HistoryDec 11, 2013 - 8:34 p.m.

Low: sudo

2013-12-1120:34:00
alas.aws.amazon.com
14

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.2%

Issue Overview:

A flaw was found in the way sudo handled time stamp files. An attacker able to run code as a local user and with the ability to control the system clock could possibly gain additional privileges by running commands that the victim user was allowed to run via sudo, without knowing the victim’s password. (CVE-2013-1775)

It was found that sudo did not properly validate the controlling terminal device when the tty_tickets option was enabled in the /etc/sudoers file. An attacker able to run code as a local user could possibly gain additional privileges by running commands that the victim user was allowed to run via sudo, without knowing the victim’s password. (CVE-2013-2776, CVE-2013-2777)

Affected Packages:

sudo

Issue Correction:
Run yum update sudo to update your system.

New Packages:

i686:  
    sudo-devel-1.8.6p3-12.17.amzn1.i686  
    sudo-debuginfo-1.8.6p3-12.17.amzn1.i686  
    sudo-1.8.6p3-12.17.amzn1.i686  
  
src:  
    sudo-1.8.6p3-12.17.amzn1.src  
  
x86_64:  
    sudo-devel-1.8.6p3-12.17.amzn1.x86_64  
    sudo-1.8.6p3-12.17.amzn1.x86_64  
    sudo-debuginfo-1.8.6p3-12.17.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-1775, CVE-2013-2776, CVE-2013-2777

Mitre: CVE-2013-1775, CVE-2013-2776, CVE-2013-2777

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

12.2%