RHSA-2013:1353: sudo security and bug fix update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:M/Au:N/C:C/I:C/A:C) | March 05, 2013 | October 03, 2013 | July 04, 2017 |
Available Exploits 
Description
The sudo (superuser do) utility allows system administrators to givecertain users the ability to run commands as root.A flaw was found in the way sudo handled time stamp files. An attacker ableto run code as a local user and with the ability to control the systemclock could possibly gain additional privileges by running commands thatthe victim user was allowed to run via sudo, without knowing the victim'spassword. (CVE-2013-1775)It was found that sudo did not properly validate the controlling terminaldevice when the tty_tickets option was enabled in the /etc/sudoers file. Anattacker able to run code as a local user could possibly gain additionalprivileges by running commands that the victim user was allowed to run viasudo, without knowing the victim's password. (CVE-2013-1776, CVE-2013-2776)This update also fixes the following bugs: sudo: unable to cache group ADDOM\admingroup, already existsWith this update, the underlying code has been modified and 'sudo -l' nowparses /etc/sudoers containing AD groups correctly. (BZ#855836)All sudo users are advised to upgrade to this updated package, whichcontains backported patches to correct these issues.
Scan For This Vulnerability
Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities
References
Solution
redhat-upgrade-sudoRelated Vulnerabilities
- OS X update for sudo (CVE-2013-2777)
- Oracle Solaris 11: CVE-2013-1776: Vulnerability in Sudo
- Gentoo Linux: CVE-2013-2777: sudo: Privilege escalation
- Gentoo Linux: CVE-2013-2776: sudo: Privilege escalation
- SUSE Linux Security Vulnerability: CVE-2013-2777
- RHSA-2013:1701: sudo security, bug fix and enhancement update
- Amazon Linux AMI: Security patch for sudo (ALAS-2013-259) (multiple CVEs)
- OS X update for sudo (CVE-2013-1775)
- FreeBSD: sudo -- Authentication bypass when clock is reset (CVE-2013-1775)
- Alpine Linux: CVE-2013-1775: Vulnerability in sudo < 1.8.6p7 allows privilege excalation
- OS X update for apache (CVE-2013-1775)
- FreeBSD: sudo -- Potential bypass of tty_tickets constraints (CVE-2013-1776)
- OS X update for apache (CVE-2013-2777)
- Oracle Solaris 11: CVE-2013-1775: Vulnerability in Sudo
- SUSE Linux Security Vulnerability: CVE-2013-1776
- ELSA-2013-1701 Low: Oracle Linux sudo security, bug fix and enhancement update
- SUSE Linux Security Vulnerability: CVE-2013-1775
- OS X update for sudo (CVE-2013-2776)
- USN-1754-1: Sudo vulnerability
- ELSA-2013-1353 Low: Oracle Linux sudo security and bug fix update
- SUSE Linux Security Vulnerability: CVE-2013-2776
- OS X update for apache (CVE-2013-2776)
- Gentoo Linux: CVE-2013-1775: sudo: Privilege escalation
- OS X update for apache (CVE-2013-1776)
- OS X update for sudo (CVE-2013-1776)
- DSA-2642-1 sudo -- several issues
- Gentoo Linux: CVE-2013-1776: sudo: Privilege escalation