Lucene search

K
gentooGentoo FoundationGLSA-201705-15
HistoryMay 30, 2017 - 12:00 a.m.

sudo: Privilege escalation

2017-05-3000:00:00
Gentoo Foundation
security.gentoo.org
53

6.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

58.3%

Background

sudo (su “do”) allows a system administrator to delegate authority to give certain users (or groups of users) the ability to run some (or all) commands as root or another user while providing an audit trail of the commands and their arguments.

Description

Qualys discovered a vulnerability in sudo’s get_process_ttyname() for Linux, that via sudo_ttyname_scan() can be directed to use a user-controlled, arbitrary tty device during its traversal of “/dev” by utilizing the world-writable /dev/shm.

For further information, please see the Qualys Security Advisory

Impact

A local attacker can pretend that his tty is any character device on the filesystem, and after two race conditions, an attacker can pretend that the controlled tty is any file on the filesystem allowing for privilege escalation

Workaround

There is no known workaround at this time.

Resolution

All sudo users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallapp-admin/sudo< 1.8.20_p1UNKNOWN

6.4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H

6.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

58.3%