CERTA-2004-AVI-371
Vulnerability from certfr_avis
sudo est un utilitaire qui permet d'accorder des droits
d'administration à des utilisateurs non privilégiés du système. Une
vulnérabilité dans l'utilisation de variables d'environnement par sudo
permet à un utilisateur local mal intentionné d'exécuter du code
arbitraire afin d'élever ses privilèges.
Solution
Mettre à jour l'utilitaire sudo avec la version 1.6.8p2 disponible sur
le site suivant :
http://www.sudo.ws
Impacted products
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Versions de sudo ant\u00e9rieures \u00e0 la version 1.6.8p2.",
"product": {
"name": "Sudo",
"vendor": {
"name": "Sudo",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solution\n\nMettre \u00e0 jour l\u0027utilitaire `sudo` avec la version 1.6.8p2 disponible sur\nle site suivant :\n\n http://www.sudo.ws\n",
"cves": [],
"initial_release_date": "2004-11-19T00:00:00",
"last_revision_date": "2004-11-24T00:00:00",
"links": [
{
"title": "R\u00e9f\u00e9rence CVE CAN-2004-1051 :",
"url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1051"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD sudo :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/security/sudo/README.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD pour sudo du 11 novembre 2004 :",
"url": "http://www.vuxml.org/freebsd/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2004:133 du 15 novembre 2004 :",
"url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:133"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-596 du 24 novembre 2004 :",
"url": "http://www.debian.org/security/2004/dsa-596"
}
],
"reference": "CERTA-2004-AVI-371",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2004-11-19T00:00:00.000000"
},
{
"description": "ajout des r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 Mandrake, FreeBSD et NetBSD.",
"revision_date": "2004-11-22T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2004-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "`sudo` est un utilitaire qui permet d\u0027accorder des droits\nd\u0027administration \u00e0 des utilisateurs non privil\u00e9gi\u00e9s du syst\u00e8me. Une\nvuln\u00e9rabilit\u00e9 dans l\u0027utilisation de variables d\u0027environnement par `sudo`\npermet \u00e0 un utilisateur local mal intentionn\u00e9 d\u0027ex\u00e9cuter du code\narbitraire afin d\u0027\u00e9lever ses privil\u00e8ges.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans l\u0027utilitaire sudo",
"vendor_advisories": [
{
"published_at": "2004-11-11",
"title": "Bulletin de s\u00e9curit\u00e9 sudo",
"url": "http://www.sudo.ws/sudo/alerts/bash_functions.html"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…