Home page logo

fulldisclosure logo Full Disclosure mailing list archives

[USN-28-1] sudo vulnerability
From: Martin Pitt <martin.pitt () canonical com>
Date: Wed, 17 Nov 2004 20:59:30 +0100

Ubuntu Security Notice USN-28-1           November 17, 2004
sudo vulnerability

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 1.6.7p5-1ubuntu4.1.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Liam Helmer discovered an input validation flaw in sudo. When the
standard shell "bash" starts up, it searches the environment for
variables with a value beginning with "()". For each of these
variables a function with the same name is created, with the function
body filled in from the environment variable's value.

A malicious user with sudo access to a shell script that uses bash can
use this feature to substitute arbitrary commands for any
non-fully-qualified programs called from the script. Therefore this
flaw can lead to privilege escalation.

  Source archives:

      Size/MD5:    19512 8732535adda58d8421cc40dfa0d4d277
      Size/MD5:      585 cad376439bd2828752b2ea6aca5ae8ca
      Size/MD5:   349785 55d503e5c35bf1ea83d38244e0242aaf

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

      Size/MD5:   155924 22253ea7307fdbab6c01e357a4dba9af

  i386 architecture (x86 compatible Intel/AMD)

      Size/MD5:   145358 4492baa2b88e8707efac77943058cc07

  powerpc architecture (Apple Macintosh G3/G4/G5)

      Size/MD5:   152864 18fa79642ba2ad55923a0a5f8cb771ba

Attachment: signature.asc
Description: Digital signature

  By Date           By Thread  

Current thread:
  • [USN-28-1] sudo vulnerability Martin Pitt (Nov 17)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]