Computer Security
[EN] securityvulns.ru no-pyccku


sudo protection bypass
updated since 02.03.2013
Published:10.03.2013
Source:
SecurityVulns ID:12913
Type:local
Threat Level:
5/10
Description:It's possible to bypass password request by manipulating timestamps. Session id hijacking is possible under some conditions.
Affected:SUDO : sudo 1.8
CVE:CVE-2013-1776 (sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to a standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.)
 CVE-2013-1775 (sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically-proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.)
Original documentdocumentUBUNTU, [USN-1754-1] Sudo vulnerability (02.03.2013)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod