|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA946] DSA-946-2 sudo Vulnerability Assessment Details
|
[DSA946] DSA-946-2 sudo |
||
DSA-946-2 sudo Detailed Explanation for this Vulnerability Assessment The former correction to vulnerabilities in the sudo package worked fine but were too strict for some environments. Therefore we have reviewed the changes again and permited some environment variables to go back into the privileged execution environment. Hence, this update. The configuration option "env_reset" is now activated by default. It will preserve only the environment variables HOME, LOGNAME, PATH, SHELL, TERM, DISPLAY, XAUTHORITY, XAUTHORIZATION, LANG, LANGUAGE, LC_*, and USER in addition to the separate SUDO_* variables. For completeness please find below the original advisory text: It has been discovered that sudo, a privileged program, that provides limited super user rights to specific users, passes several environment variables to the program that runs with elevated rights. In the case of include paths (e.g. for Perl, Python, Ruby or other scripting languages) this can cause arbitrary code to be executed as privileged user if the attacker points to a manipulated version of a system library. This update alters the former behaviour of sudo and limits the number of supported environment variables to LC_*, LANG, LANGUAGE and TERM. Additional variables are only passed through when set as env_check in /etc/sudoers, which might be required for some scripts to continue to work. For the old stable distribution (woody) this problem has been fixed in version 1.6.6-1.6. For the stable distribution (sarge) this problem has been fixed in version 1.6.8p7-1.4. For the unstable distribution (sid) the same behaviour will be implemented soon. We recommend that you upgrade your sudo package. For unstable "Defaults = env_reset" need to be added to /etc/sudoers manually. Solution : http://www.debian.org/security/2006/dsa-946 Network Security Threat Level: High Networks Security ID: 16184 Vulnerability Assessment Copyright: This script is (C) 2006 Michel Arboi |
||
Cables, Connectors |
Intel Core i7-10700T 2.00GHz 8-Core SRH6U 16-Thread LGA-1200 Processor
$539.96
Intel Xeon Platinum 8356H Processors 8-Core CPU 3.90GHz-4.40GHz 190W LGA4189
$3882.12
Intel Xeon E-2378G Processor CPU 8-Core 2.80GHz~5.10GHz LGA-1200 TDP-80W P750
$927.78
Intel Xeon E-2288G Processor CPU 8-Core 3.70GHz~5.0GHz LGA-1151 TDP-95W P630
$862.95
Intel - Core i9-13900K 13th Gen 24 cores 8 P-cores + 16 E-cores 36M Cache, 3 ...
$689.99
Intel - Core i9-12900K Desktop Processor 16 (8P+8E) Cores up to 5.2 GHz Unloc...
$619.99
Intel - Core i7-13700K 13th Gen 16 cores 8 P-cores + 8 E-cores 30M Cache, 3.4...
$489.99
Apple iMac Pro 2017 27 Inch 5K 3.2 GHz 8-Core Xeon 64GB RAM 1TB Vega
$1295.00
ALLEGIANCE Desktop Computer Gaming PC: Intel 8 Core 128GB RAM, 2TB SSD, GeForce
$687.99
FAST Dell TOUCHSCREEN 8th Gen Intel Quad Core 16GB RAM Pick SSD Wi-Fi BT Win11
$199.00
|
||
No Discussions have been posted on this vulnerability. |