Lucene search

K
freebsdFreeBSD67B514C3-BA8F-11DF-8F6E-000C29A67389
HistorySep 07, 2010 - 12:00 a.m.

sudo -- Flaw in Runas group matching

2010-09-0700:00:00
vuxml.freebsd.org
10

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

10.3%

Todd Miller reports:

Beginning with sudo version 1.7.0 it has been possible to grant
permission to run a command using a specified group via sudo -g
option (run as group). A flaw exists in the logic that matches
Runas groups in the sudoers file when the -u option is also
specified (run as user). This flaw results in a positive match for
the user specified via -u so long as the group specified via -g
is allowed by the sudoers file.
Exploitation of the flaw requires that Sudo be configured with
sudoers entries that contain a Runas group. Entries that do not
contain a Runas group, or only contain a Runas user are not
affected.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsudo= 1.7.0UNKNOWN
FreeBSDanynoarchsudo< 1.7.4.4UNKNOWN

6.2 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:H/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

10.3%