Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in sudo
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in sudo
ID: MDVSA-2010:078
Distribution: Mandriva
Plattformen: Mandriva Corporate 4.0, Mandriva 2008.0, Mandriva 2009.1, Mandriva Enterprise Server 5.0, Mandriva 2010.0
Datum: So, 18. April 2010, 19:26
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
Applikationen: sudo

Originalnachricht

This is a multi-part message in MIME format...

------------=_1271516950-24326-6969


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2010:078
http://www.mandriva.com/security/
_______________________________________________________________________

Package : sudo
Date : April 17, 2010
Affected: 2008.0, 2009.1, 2010.0, Corporate 4.0, Enterprise Server 5.0
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in sudo:

The command matching functionality in sudo 1.6.8 through 1.7.2p5 does
not properly handle when a file in the current working directory has
the same name as a pseudo-command in the sudoers file and the PATH
contains an entry for ., which allows local users to execute arbitrary
commands via a Trojan horse executable, as demonstrated using sudoedit,
a different vulnerability than CVE-2010-0426 (CVE-2010-1163).

Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.

The updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1163
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2008.0:
1c5dcba21c94b32d088cea290b9289c1
2008.0/i586/sudo-1.6.9p5-1.3mdv2008.0.i586.rpm
c08dc2b7a2c9b70eb7a88c7a0c27339b
2008.0/SRPMS/sudo-1.6.9p5-1.3mdv2008.0.src.rpm

Mandriva Linux 2008.0/X86_64:
c318cf27c9854dbf9ab3161b1ca0e4df
2008.0/x86_64/sudo-1.6.9p5-1.3mdv2008.0.x86_64.rpm
c08dc2b7a2c9b70eb7a88c7a0c27339b
2008.0/SRPMS/sudo-1.6.9p5-1.3mdv2008.0.src.rpm

Mandriva Linux 2009.1:
5a7bf57e7c12755cd7bb9748ff1f7dfa 2009.1/i586/sudo-1.7.0-1.4mdv2009.1.i586.rpm

255a1fe014959704dfe62df017a35c64 2009.1/SRPMS/sudo-1.7.0-1.4mdv2009.1.src.rpm

Mandriva Linux 2009.1/X86_64:
6909e7918c91397764ced733cff144b6
2009.1/x86_64/sudo-1.7.0-1.4mdv2009.1.x86_64.rpm
255a1fe014959704dfe62df017a35c64 2009.1/SRPMS/sudo-1.7.0-1.4mdv2009.1.src.rpm

Mandriva Linux 2010.0:
6836def05490065a3ef690a4db6ceaeb
2010.0/i586/sudo-1.7.2-0.p1.1.2mdv2010.0.i586.rpm
97644d9dcc9192176ff164025888fe23
2010.0/SRPMS/sudo-1.7.2-0.p1.1.2mdv2010.0.src.rpm

Mandriva Linux 2010.0/X86_64:
8a58adfb365a2e4a72aac915888f3941
2010.0/x86_64/sudo-1.7.2-0.p1.1.2mdv2010.0.x86_64.rpm
97644d9dcc9192176ff164025888fe23
2010.0/SRPMS/sudo-1.7.2-0.p1.1.2mdv2010.0.src.rpm

Corporate 4.0:
760d7e5fae3e0283baee3fc68c7cbdb4
corporate/4.0/i586/sudo-1.6.8p8-2.5.20060mlcs4.i586.rpm
068d3d23081e2a62b87ebcb025ed6177
corporate/4.0/SRPMS/sudo-1.6.8p8-2.5.20060mlcs4.src.rpm

Corporate 4.0/X86_64:
1099c6e86bce8999137e592ff81202a2
corporate/4.0/x86_64/sudo-1.6.8p8-2.5.20060mlcs4.x86_64.rpm
068d3d23081e2a62b87ebcb025ed6177
corporate/4.0/SRPMS/sudo-1.6.8p8-2.5.20060mlcs4.src.rpm

Mandriva Enterprise Server 5:
3b933bf059e256b39720266c081366b7
mes5/i586/sudo-1.6.9p17-1.4mdvmes5.1.i586.rpm
3ce4545a21807d50a6c56c8793568e13
mes5/SRPMS/sudo-1.6.9p17-1.4mdvmes5.1.src.rpm

Mandriva Enterprise Server 5/X86_64:
b49b8aba5f3b10396be9d1444797999b
mes5/x86_64/sudo-1.6.9p17-1.4mdvmes5.1.x86_64.rpm
3ce4545a21807d50a6c56c8793568e13
mes5/SRPMS/sudo-1.6.9p17-1.4mdvmes5.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iD8DBQFLyaAAmqjQ0CJFipgRAsasAJ9l0oMEEHyBdqV9J6+LVj5gooFeugCdHn1X
yyJFCSFqq041/Y5C710vjcQ=
=X6c5
-----END PGP SIGNATURE-----


------------=_1271516950-24326-6969
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1271516950-24326-6969--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung