Lucene search

K
ubuntuUbuntuUSN-1046-1
HistoryJan 20, 2011 - 12:00 a.m.

Sudo vulnerability

2011-01-2000:00:00
ubuntu.com
39

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

17.2%

Releases

  • Ubuntu 10.10
  • Ubuntu 10.04
  • Ubuntu 9.10

Packages

  • sudo - Provide limited super user privileges to specific users

Details

Alexander Kurtz discovered that sudo would not prompt for a password when
a group was specified in the Runas_Spec. A local attacker could exploit
this to execute arbitrary code as the specified group if sudo was
configured to allow the attacker to use a program as this group. The group
Runas_Spec is not used in the default installation of Ubuntu.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchsudo-ldap< 1.7.0-1ubuntu2.6UNKNOWN
Ubuntu9.10noarchsudo< 1.7.0-1ubuntu2.6UNKNOWN
Ubuntu10.10noarchsudo-ldap< 1.7.2p7-1ubuntu2.1UNKNOWN
Ubuntu10.10noarchsudo< 1.7.2p7-1ubuntu2.1UNKNOWN
Ubuntu10.04noarchsudo-ldap< 1.7.2p1-1ubuntu5.3UNKNOWN
Ubuntu10.04noarchsudo< 1.7.2p1-1ubuntu5.3UNKNOWN

CVSS2

4.4

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

17.2%