what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Mandriva Linux Security Advisory 2010-078

Mandriva Linux Security Advisory 2010-078
Posted Apr 19, 2010
Authored by Mandriva | Site mandriva.com

Mandriva Linux Security Advisory 2010-078 - The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for., which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.

tags | advisory, arbitrary, local, trojan
systems | linux, mandriva
advisories | CVE-2010-1163
SHA-256 | d73db4cce13f07558bb167bb1c09f7caf34a09bdb07a74b3921f8547fa6960e6

Mandriva Linux Security Advisory 2010-078

Change Mirror Download

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:078
http://www.mandriva.com/security/
_______________________________________________________________________

Package : sudo
Date : April 17, 2010
Affected: 2008.0, 2009.1, 2010.0, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in sudo:

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does
not properly handle when a file in the current working directory has
the same name as a pseudo-command in the sudoers file and the PATH
contains an entry for ., which allows local users to execute arbitrary
commands via a Trojan horse executable, as demonstrated using sudoedit,
a different vulnerability than CVE-2010-0426 (CVE-2010-1163).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
1c5dcba21c94b32d088cea290b9289c1 2008.0/i586/sudo-1.6.9p5-1.3mdv2008.0.i586.rpm
c08dc2b7a2c9b70eb7a88c7a0c27339b 2008.0/SRPMS/sudo-1.6.9p5-1.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
c318cf27c9854dbf9ab3161b1ca0e4df 2008.0/x86_64/sudo-1.6.9p5-1.3mdv2008.0.x86_64.rpm
c08dc2b7a2c9b70eb7a88c7a0c27339b 2008.0/SRPMS/sudo-1.6.9p5-1.3mdv2008.0.src.rpm

Mandriva Linux 2009.1:
5a7bf57e7c12755cd7bb9748ff1f7dfa 2009.1/i586/sudo-1.7.0-1.4mdv2009.1.i586.rpm
255a1fe014959704dfe62df017a35c64 2009.1/SRPMS/sudo-1.7.0-1.4mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
6909e7918c91397764ced733cff144b6 2009.1/x86_64/sudo-1.7.0-1.4mdv2009.1.x86_64.rpm
255a1fe014959704dfe62df017a35c64 2009.1/SRPMS/sudo-1.7.0-1.4mdv2009.1.src.rpm

Mandriva Linux 2010.0:
6836def05490065a3ef690a4db6ceaeb 2010.0/i586/sudo-1.7.2-0.p1.1.2mdv2010.0.i586.rpm
97644d9dcc9192176ff164025888fe23 2010.0/SRPMS/sudo-1.7.2-0.p1.1.2mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
8a58adfb365a2e4a72aac915888f3941 2010.0/x86_64/sudo-1.7.2-0.p1.1.2mdv2010.0.x86_64.rpm
97644d9dcc9192176ff164025888fe23 2010.0/SRPMS/sudo-1.7.2-0.p1.1.2mdv2010.0.src.rpm

Corporate 4.0:
760d7e5fae3e0283baee3fc68c7cbdb4 corporate/4.0/i586/sudo-1.6.8p8-2.5.20060mlcs4.i586.rpm
068d3d23081e2a62b87ebcb025ed6177 corporate/4.0/SRPMS/sudo-1.6.8p8-2.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
1099c6e86bce8999137e592ff81202a2 corporate/4.0/x86_64/sudo-1.6.8p8-2.5.20060mlcs4.x86_64.rpm
068d3d23081e2a62b87ebcb025ed6177 corporate/4.0/SRPMS/sudo-1.6.8p8-2.5.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
3b933bf059e256b39720266c081366b7 mes5/i586/sudo-1.6.9p17-1.4mdvmes5.1.i586.rpm
3ce4545a21807d50a6c56c8793568e13 mes5/SRPMS/sudo-1.6.9p17-1.4mdvmes5.1.src.rpm

Mandriva Enterprise Server 5/X86_64:
b49b8aba5f3b10396be9d1444797999b mes5/x86_64/sudo-1.6.9p17-1.4mdvmes5.1.x86_64.rpm
3ce4545a21807d50a6c56c8793568e13 mes5/SRPMS/sudo-1.6.9p17-1.4mdvmes5.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLyaAAmqjQ0CJFipgRAsasAJ9l0oMEEHyBdqV9J6+LVj5gooFeugCdHn1X
yyJFCSFqq041/Y5C710vjcQ=
=X6c5
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    0 Files
  • 8
    Nov 8th
    0 Files
  • 9
    Nov 9th
    0 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close