Vulnerability & Exploit Database

Back to search

RHSA-2013:1353: sudo security and bug fix update

Severity CVSS Published Added Modified
7 (AV:L/AC:M/Au:N/C:C/I:C/A:C) March 05, 2013 October 03, 2013 July 04, 2017

Available Exploits 

Description

The sudo (superuser do) utility allows system administrators to givecertain users the ability to run commands as root.A flaw was found in the way sudo handled time stamp files. An attacker ableto run code as a local user and with the ability to control the systemclock could possibly gain additional privileges by running commands thatthe victim user was allowed to run via sudo, without knowing the victim'spassword. (CVE-2013-1775)It was found that sudo did not properly validate the controlling terminaldevice when the tty_tickets option was enabled in the /etc/sudoers file. Anattacker able to run code as a local user could possibly gain additionalprivileges by running commands that the victim user was allowed to run viasudo, without knowing the victim's password. (CVE-2013-1776, CVE-2013-2776)This update also fixes the following bugs: sudo: unable to cache group ADDOM\admingroup, already existsWith this update, the underlying code has been modified and 'sudo -l' nowparses /etc/sudoers containing AD groups correctly. (BZ#855836)All sudo users are advised to upgrade to this updated package, whichcontains backported patches to correct these issues.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

References

Solution

redhat-upgrade-sudo

Related Vulnerabilities