[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[linux-security] sudo buffer overflow



Topic
=====
local root exploit in sudo

Problem descirption
===================
A buffer overflow in sudo (versions < 1.6.3p6) can potentially be used to
gain root privilages on the local system.

Affected Systems
================
Systems that have sudo with versions < 1.6.3p6 installed.

Remark
======
Installing and using sudo is good security practise. If your Linux distribution
does not provide a sudo packages, you can pick up one from sphinx.sfu.ca
in the directory /vol/vol1/distrib/redhat/contrib.

Solution
========
Upgrade to version 1.6.3p6

RedHat 6.x
----------
RedHat 6.x did not come with sudo. Use the sudo package from sphinx
(see remark above).

RedHat 7.0
----------
rpm -Uvh sudo-1.6.3p6-1.i386.rpm

Debian 2.2 (potato)
-------------------
update to sudo_1.6.2p2-1potato1_i386.deb
(this is a patched 1.6.2p2 version that no longer contains the bug)

Mandrake 7.1
------------
rpm -Uvh sudo-1.6.3p6-1.3mdk.i586.rpm

Mandrake 7.2
------------
rpm -Uvh sudo-1.6.3p6-1.1mdk.i586.rpm