Rapid7 Vulnerability & Exploit Database

RHSA-2013:1701: sudo security, bug fix and enhancement update

Back to Search

RHSA-2013:1701: sudo security, bug fix and enhancement update

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
03/05/2013
Created
07/25/2018
Added
11/21/2013
Modified
07/04/2017

Description

The sudo (superuser do) utility allows system administrators to givecertain users the ability to run commands as root.A flaw was found in the way sudo handled time stamp files. An attacker ableto run code as a local user and with the ability to control the systemclock could possibly gain additional privileges by running commands thatthe victim user was allowed to run via sudo, without knowing the victim'spassword. (CVE-2013-1775)It was found that sudo did not properly validate the controlling terminaldevice when the tty_tickets option was enabled in the /etc/sudoers file.An attacker able to run code as a local user could possibly gain additionalprivileges by running commands that the victim user was allowed to run viasudo, without knowing the victim's password. (CVE-2013-2776, CVE-2013-2777)This update also fixes the following bugs:In addition, this update adds the following enhancements:All sudo users are advised to upgrade to this updated package, whichcontains backported patches to correct these issues and addthese enhancements.

Solution(s)

  • redhat-upgrade-sudo
  • redhat-upgrade-sudo-debuginfo
  • redhat-upgrade-sudo-devel

References

  • redhat-upgrade-sudo
  • redhat-upgrade-sudo-debuginfo
  • redhat-upgrade-sudo-devel

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;