USN-983-1: Sudo vulnerability

Publication date

7 September 2010

Overview

Under non-default configurations, a local user could run programs with administrator privileges.


Packages

  • sudo - Provide limited super user privileges to specific users

Details

Markus Wuethrich discovered that sudo did not always verify the user when a
group was specified in the Runas_Spec. A local attacker could exploit this
to execute arbitrary code as root if sudo was configured to allow the
attacker to use a program as a group when the attacker was not a part of
that group.

Markus Wuethrich discovered that sudo did not always verify the user when a
group was specified in the Runas_Spec. A local attacker could exploit this
to execute arbitrary code as root if sudo was configured to allow the
attacker to use a program as a group when the attacker was not a part of
that group.

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
9.10 karmic sudo-ldap –  1.7.0-1ubuntu2.5
sudo –  1.7.0-1ubuntu2.5
10.04 lucid sudo-ldap –  1.7.2p1-1ubuntu5.2
sudo –  1.7.2p1-1ubuntu5.2

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›