Lucene search

K
threatpostChris BrookTHREATPOST:F7D745AB279D28510E91229D1CA48DC0
HistoryAug 29, 2013 - 1:28 p.m.

Metasploit Module Adds Sudo Vulnerability for OS X

2013-08-2913:28:56
Chris Brook
threatpost.com
20

0.0004 Low

EPSS

Percentile

10.7%

Attackers looking to exploit a previously disclosed and apparently still unpatched bug in sudo, a Unix-based Linux command found in most Apple OS X builds have gotten a little more help this week.

As Threatpost reported in March, the vulnerability (CVE-2013-1775) can essentially set back the compromised systemโ€™s clock to January 1, 1970, also known as the epoch, so the attacker can be granted access to the machine without entering a password.

Sudo manages user privileges on several types of systems, including versions of OS X from Lion 10.7 to Mountain Lion 10.8.4, as well as several Linux distributions.

Metasploit, the penetration testing software that makes it easier to exploit vulnerabilities, added a module this week that makes exploiting the sudo vulnerability less difficult.

Developed by the folks over at Rapid 7, the Metasploit tool has proved invaluable for security researchers who investigate flaws and โ€œpen testโ€ software.

The module โ€œgains a session with root permissionsโ€ as long as the user has run the sudo command before and as long as they have administrative privileges, according to a Packet Storm Security post Monday by sudo developer Todd Miller, Rapid 7โ€™s Joe Vennix and Metasploit developer Juan Vazquez.

In addition to the previously mentioned conditions, they of course must have physical or remote access on top of admin access to the machine, making execution of the bug even less likely.

Miller previously reported that Sudo 1.8.6p7 and 1.7.10p7 fixed the bug and made it so future versions would ignore the epoch time stamp, in a Seclists post in February but this module appears to circumvent that.