Lucene search

K
freebsdFreeBSD018A84D0-2548-11DF-B4A3-00E0815B8DA8
HistoryJan 29, 2010 - 12:00 a.m.

sudo -- Privilege escalation with sudoedit

2010-01-2900:00:00
vuxml.freebsd.org
52

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

10.1%

Todd Miller reports:

When sudo performs its command matching, there is a special case
for pseudo-commands in the sudoers file (currently, the only
pseudo-command is sudoedit). Unlike a regular command,
pseudo-commands do not begin with a slash (β€˜/’). The flaw is that
sudo’s the matching code would only check against the list of
pseudo-commands if the user-specified command also contained no
slashes. As a result, if the user ran β€œsudo ./sudoedit” the normal
matching code path was followed, which uses stat(2) to verify that
the user-specified command matches the one in sudoers. In this
case, it would compare the β€œ./sudoedit” specified by the user with
β€œsudoedit” from the sudoers file, resulting in a positive
match.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsudo<Β 1.7.2.4UNKNOWN

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

10.1%