An update for sudo is available for Red Hat Enterprise Linux 6 and 7, with a security impact rated as Important due to privilege escalation vulnerability
Reporter | Title | Published | Views | Family All 128 |
---|---|---|---|---|
![]() | Ubuntu 14.04 LTS / 16.04 LTS : Sudo vulnerability (USN-3304-1) | 31 May 201700:00 | – | nessus |
![]() | SUSE SLED12 / SLES12 Security Update : sudo (SUSE-SU-2017:1446-1) | 31 May 201700:00 | – | nessus |
![]() | CentOS 6 / 7 : sudo (CESA-2017:1382) | 1 Jun 201700:00 | – | nessus |
![]() | EulerOS 2.0 SP2 : sudo (EulerOS-SA-2017-1107) | 9 Jun 201700:00 | – | nessus |
![]() | Oracle Linux 6 / 7 : sudo (ELSA-2017-1382) | 31 May 201700:00 | – | nessus |
![]() | Fedora 25 : sudo (2017-54580efa82) | 5 Jun 201700:00 | – | nessus |
![]() | EulerOS 2.0 SP1 : sudo (EulerOS-SA-2017-1106) | 9 Jun 201700:00 | – | nessus |
![]() | RHEL 5 : sudo (RHSA-2017:1381) | 2 Jun 201700:00 | – | nessus |
![]() | RHEL 6 / 7 : sudo (RHSA-2017:1382) | 31 May 201700:00 | – | nessus |
![]() | Fedora 24 : sudo (2017-facd994774) | 9 Jun 201700:00 | – | nessus |
Source | Link |
---|---|
nessus | www.nessus.org/u |
cve | www.cve.mitre.org/cgi-bin/cvename.cgi |
access | www.access.redhat.com/errata/RHSA-2017-1382 |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(101478);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id(
"CVE-2017-1000367"
);
script_name(english:"Virtuozzo 6 : sudo / sudo-devel (VZLSA-2017-1382)");
script_summary(english:"Checks the rpm output for the updated package.");
script_set_attribute(attribute:"synopsis", value:
"The remote Virtuozzo host is missing a security update.");
script_set_attribute(attribute:"description", value:
"An update for sudo is now available for Red Hat Enterprise Linux 6 and
Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
The sudo packages contain the sudo utility which allows system
administrators to provide certain users with the permission to execute
privileged commands, which are used for system management purposes,
without having to log in as root.
Security Fix(es) :
* A flaw was found in the way sudo parsed tty information from the
process status file in the proc filesystem. A local user with
privileges to execute commands via sudo could use this flaw to
escalate their privileges to root. (CVE-2017-1000367)
Red Hat would like to thank Qualys Security for reporting this issue.
Note that Tenable Network Security has attempted to extract the
preceding description block directly from the corresponding Red Hat
security advisory. Virtuozzo provides no description for VZLSA
advisories. Tenable has attempted to automatically clean and format
it as much as possible without introducing additional issues.");
# http://repo.virtuozzo.com/vzlinux/announcements/json/VZLSA-2017-1382.json
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?db07342b");
script_set_attribute(attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2017-1382");
script_set_attribute(attribute:"solution", value:
"Update the affected sudo / sudo-devel package.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"patch_publication_date", value:"2017/05/31");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:sudo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:virtuozzo:virtuozzo:sudo-devel");
script_set_attribute(attribute:"cpe", value:"cpe:/o:virtuozzo:virtuozzo:6");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/07/13");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Virtuozzo Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Virtuozzo/release", "Host/Virtuozzo/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Virtuozzo/release");
if (isnull(release) || "Virtuozzo" >!< release) audit(AUDIT_OS_NOT, "Virtuozzo");
os_ver = pregmatch(pattern: "Virtuozzo Linux release ([0-9]+\.[0-9])(\D|$)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Virtuozzo");
os_ver = os_ver[1];
if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Virtuozzo 6.x", "Virtuozzo " + os_ver);
if (!get_kb_item("Host/Virtuozzo/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Virtuozzo", cpu);
flag = 0;
pkgs = ["sudo-1.8.6p3-28.vl6",
"sudo-devel-1.8.6p3-28.vl6"];
foreach (pkg in pkgs)
if (rpm_check(release:"Virtuozzo-6", reference:pkg)) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "sudo / sudo-devel");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo