Mandriva Linux Security Advisory 2010-078 - The command matching functionality in sudo 1.6.8 through 1.7.2p5 does not properly handle when a file in the current working directory has the same name as a pseudo-command in the sudoers file and the PATH contains an entry for., which allows local users to execute arbitrary commands via a Trojan horse executable, as demonstrated using sudoedit, a different vulnerability than CVE-2010-0426. Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers. The updated packages have been patched to correct this issue.
d73db4cce13f07558bb167bb1c09f7caf34a09bdb07a74b3921f8547fa6960e6
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2010:078
http://www.mandriva.com/security/
_______________________________________________________________________
Package : sudo
Date : April 17, 2010
Affected: 2008.0, 2009.1, 2010.0, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in sudo:
The command matching functionality in sudo 1.6.8 through 1.7.2p5 does
not properly handle when a file in the current working directory has
the same name as a pseudo-command in the sudoers file and the PATH
contains an entry for ., which allows local users to execute arbitrary
commands via a Trojan horse executable, as demonstrated using sudoedit,
a different vulnerability than CVE-2010-0426 (CVE-2010-1163).
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
The updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.0:
1c5dcba21c94b32d088cea290b9289c1 2008.0/i586/sudo-1.6.9p5-1.3mdv2008.0.i586.rpm
c08dc2b7a2c9b70eb7a88c7a0c27339b 2008.0/SRPMS/sudo-1.6.9p5-1.3mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
c318cf27c9854dbf9ab3161b1ca0e4df 2008.0/x86_64/sudo-1.6.9p5-1.3mdv2008.0.x86_64.rpm
c08dc2b7a2c9b70eb7a88c7a0c27339b 2008.0/SRPMS/sudo-1.6.9p5-1.3mdv2008.0.src.rpm
Mandriva Linux 2009.1:
5a7bf57e7c12755cd7bb9748ff1f7dfa 2009.1/i586/sudo-1.7.0-1.4mdv2009.1.i586.rpm
255a1fe014959704dfe62df017a35c64 2009.1/SRPMS/sudo-1.7.0-1.4mdv2009.1.src.rpm
Mandriva Linux 2009.1/X86_64:
6909e7918c91397764ced733cff144b6 2009.1/x86_64/sudo-1.7.0-1.4mdv2009.1.x86_64.rpm
255a1fe014959704dfe62df017a35c64 2009.1/SRPMS/sudo-1.7.0-1.4mdv2009.1.src.rpm
Mandriva Linux 2010.0:
6836def05490065a3ef690a4db6ceaeb 2010.0/i586/sudo-1.7.2-0.p1.1.2mdv2010.0.i586.rpm
97644d9dcc9192176ff164025888fe23 2010.0/SRPMS/sudo-1.7.2-0.p1.1.2mdv2010.0.src.rpm
Mandriva Linux 2010.0/X86_64:
8a58adfb365a2e4a72aac915888f3941 2010.0/x86_64/sudo-1.7.2-0.p1.1.2mdv2010.0.x86_64.rpm
97644d9dcc9192176ff164025888fe23 2010.0/SRPMS/sudo-1.7.2-0.p1.1.2mdv2010.0.src.rpm
Corporate 4.0:
760d7e5fae3e0283baee3fc68c7cbdb4 corporate/4.0/i586/sudo-1.6.8p8-2.5.20060mlcs4.i586.rpm
068d3d23081e2a62b87ebcb025ed6177 corporate/4.0/SRPMS/sudo-1.6.8p8-2.5.20060mlcs4.src.rpm
Corporate 4.0/X86_64:
1099c6e86bce8999137e592ff81202a2 corporate/4.0/x86_64/sudo-1.6.8p8-2.5.20060mlcs4.x86_64.rpm
068d3d23081e2a62b87ebcb025ed6177 corporate/4.0/SRPMS/sudo-1.6.8p8-2.5.20060mlcs4.src.rpm
Mandriva Enterprise Server 5:
3b933bf059e256b39720266c081366b7 mes5/i586/sudo-1.6.9p17-1.4mdvmes5.1.i586.rpm
3ce4545a21807d50a6c56c8793568e13 mes5/SRPMS/sudo-1.6.9p17-1.4mdvmes5.1.src.rpm
Mandriva Enterprise Server 5/X86_64:
b49b8aba5f3b10396be9d1444797999b mes5/x86_64/sudo-1.6.9p17-1.4mdvmes5.1.x86_64.rpm
3ce4545a21807d50a6c56c8793568e13 mes5/SRPMS/sudo-1.6.9p17-1.4mdvmes5.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFLyaAAmqjQ0CJFipgRAsasAJ9l0oMEEHyBdqV9J6+LVj5gooFeugCdHn1X
yyJFCSFqq041/Y5C710vjcQ=
=X6c5
-----END PGP SIGNATURE-----