what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice 956-1

Ubuntu Security Notice 956-1
Posted Jul 1, 2010
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 956-1 - Evan Broder and Anders Kaseorg discovered that sudo did not properly sanitize its environment when configured to use secure_path (the default in Ubuntu). A local attacker could exploit this to execute arbitrary code as root if sudo was configured to allow the attacker to use a program that interpreted the PATH environment variable.

tags | advisory, arbitrary, local, root
systems | linux, ubuntu
advisories | CVE-2010-1646
SHA-256 | 3037de18c813969c11a9138193a5c6d4ce5ee796f319b9f4908916e348a376d4

Ubuntu Security Notice 956-1

Change Mirror Download
===========================================================
Ubuntu Security Notice USN-956-1 June 30, 2010
sudo vulnerability
CVE-2010-1646
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 6.06 LTS
Ubuntu 8.04 LTS
Ubuntu 9.04
Ubuntu 9.10
Ubuntu 10.04 LTS

This advisory also applies to the corresponding versions of
Kubuntu, Edubuntu, and Xubuntu.

The problem can be corrected by upgrading your system to the
following package versions:

Ubuntu 6.06 LTS:
sudo 1.6.8p12-1ubuntu6.3
sudo-ldap 1.6.8p12-1ubuntu6.3

Ubuntu 8.04 LTS:
sudo 1.6.9p10-1ubuntu3.8
sudo-ldap 1.6.9p10-1ubuntu3.8

Ubuntu 9.04:
sudo 1.6.9p17-1ubuntu3.3
sudo-ldap 1.6.9p17-1ubuntu3.3

Ubuntu 9.10:
sudo 1.7.0-1ubuntu2.4
sudo-ldap 1.7.0-1ubuntu2.4

Ubuntu 10.04 LTS:
sudo 1.7.2p1-1ubuntu5.1
sudo-ldap 1.7.2p1-1ubuntu5.1

In general, a standard system update will make all the necessary changes.

Details follow:

Evan Broder and Anders Kaseorg discovered that sudo did not properly
sanitize its environment when configured to use secure_path (the default in
Ubuntu). A local attacker could exploit this to execute arbitrary code as
root if sudo was configured to allow the attacker to use a program that
interpreted the PATH environment variable.


Updated packages for Ubuntu 6.06 LTS:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3.diff.gz
Size/MD5: 37216 36d4b120d354c87515638af637c67b0d
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3.dsc
Size/MD5: 618 fd85854200bf0fedfd8cfc2eea79f99f
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12.orig.tar.gz
Size/MD5: 585643 b29893c06192df6230dd5f340f3badf5

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_amd64.deb
Size/MD5: 177586 2cd655781c221cae8b6cad28940f5c0b
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_amd64.deb
Size/MD5: 189546 e56b9addd85551a900c7c41043790cc7

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_i386.deb
Size/MD5: 163104 b2f38f1ef9367319175c324686dd412c
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_i386.deb
Size/MD5: 174564 e2b8a930e343743aeba947c596d1ede8

powerpc architecture (Apple Macintosh G3/G4/G5):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_powerpc.deb
Size/MD5: 171814 ef22e4eb3671266eedfb8379f00976fa
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_powerpc.deb
Size/MD5: 183978 713c3bb97173d3a9749d7a41b2a4a050

sparc architecture (Sun SPARC/UltraSPARC):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.8p12-1ubuntu6.3_sparc.deb
Size/MD5: 167838 4444228753a954e3467eced9ac5388cb
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.8p12-1ubuntu6.3_sparc.deb
Size/MD5: 180344 4387b62da168e7332b46e33fa322dd4d

Updated packages for Ubuntu 8.04 LTS:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8.diff.gz
Size/MD5: 29555 823267afe725ef0ae810d4fc7700d6bd
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8.dsc
Size/MD5: 702 03f53a9efbb7700134b4148bfc19a561
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10.orig.tar.gz
Size/MD5: 579302 16db2a1213159a1fac8239eab58108f5

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_amd64.deb
Size/MD5: 188554 4f9915f8178f0d76a869727e5b46f24c
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_amd64.deb
Size/MD5: 200236 3d0dcf5ef68f5e1f9386b124a2d5742c

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_i386.deb
Size/MD5: 176750 25768f74f7307dba01043312d5eb7762
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_i386.deb
Size/MD5: 187664 bb916ab875765dd99eba9854372bf07f

lpia architecture (Low Power Intel Architecture):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_lpia.deb
Size/MD5: 177924 7d937eb2ec4ca7383af5f45bf00f577a
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_lpia.deb
Size/MD5: 188644 808af9dcc20690a441ed35510748e749

powerpc architecture (Apple Macintosh G3/G4/G5):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_powerpc.deb
Size/MD5: 188840 f00f19aaae04cc80d5fe1984d822fd2c
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_powerpc.deb
Size/MD5: 202650 e55052d973d6c2fd2043defcc282c3f5

sparc architecture (Sun SPARC/UltraSPARC):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p10-1ubuntu3.8_sparc.deb
Size/MD5: 182768 6e0af3cc2bc1b5f892eaab248c7ad8ec
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p10-1ubuntu3.8_sparc.deb
Size/MD5: 193902 0c1e237c1b994c2c82bfcf3f0ef7eaa5

Updated packages for Ubuntu 9.04:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3.diff.gz
Size/MD5: 26524 ec4d4eb3a0cad8e53158420c2b24e971
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3.dsc
Size/MD5: 1098 2c73a1f6b6a18d8c201cbe3562f8e9c4
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17.orig.tar.gz
Size/MD5: 593534 60daf18f28e2c1eb7641c4408e244110

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_amd64.deb
Size/MD5: 191512 cf450b2ede8d4e51dce2e8c373c7388b
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_amd64.deb
Size/MD5: 202506 a5eb0005ccfa19658f35cf731c132562

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_i386.deb
Size/MD5: 179656 3a1893071ae30a1432b65c9324d44d91
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_i386.deb
Size/MD5: 189098 dc1d5298fee0ce78e8848aeeff851120

lpia architecture (Low Power Intel Architecture):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_lpia.deb
Size/MD5: 180712 0a9c3a5d3087bdb0e2338e42a9331038
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_lpia.deb
Size/MD5: 189918 ce218336ad2636084f85c5021001751b

powerpc architecture (Apple Macintosh G3/G4/G5):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_powerpc.deb
Size/MD5: 189010 422acec867c52e8e3f9bd56371078377
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_powerpc.deb
Size/MD5: 201504 282cc2ca98c0ae4321f272d78fd0a18d

sparc architecture (Sun SPARC/UltraSPARC):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.6.9p17-1ubuntu3.3_sparc.deb
Size/MD5: 184370 06d2468d2b1c299beb7e95da9cbc2772
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.6.9p17-1ubuntu3.3_sparc.deb
Size/MD5: 194100 69979206fc67d3b70d1639c7cf40712d

Updated packages for Ubuntu 9.10:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4.diff.gz
Size/MD5: 24804 80718336a92f5c63f38ee7d84c8ff170
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4.dsc
Size/MD5: 1117 0a739ae85420fc8043bc66f03a743676
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0.orig.tar.gz
Size/MD5: 744311 5fd96bba35fe29b464f7aa6ad255f0a6

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_amd64.deb
Size/MD5: 310494 5fb9286a8835453da39328a9ef46932a
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_amd64.deb
Size/MD5: 334170 235e0f65990362782228dece635dee16

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_i386.deb
Size/MD5: 297946 aa67fe2e4c89151c743a86404e473833
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_i386.deb
Size/MD5: 319482 e5518c7a600c3f3b316e52767ef8907d

lpia architecture (Low Power Intel Architecture):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_lpia.deb
Size/MD5: 298134 152bfbe937de0aa1a7bb3d181700d7bb
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_lpia.deb
Size/MD5: 319938 370ba3cd5d80883e7b8af93211756a20

powerpc architecture (Apple Macintosh G3/G4/G5):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_powerpc.deb
Size/MD5: 306170 e48e9bcc46b849c75675a84a85b07368
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_powerpc.deb
Size/MD5: 329136 348631f216fbf1bdd7ee0249911fb4ff

sparc architecture (Sun SPARC/UltraSPARC):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.0-1ubuntu2.4_sparc.deb
Size/MD5: 301730 0fe061194552253d3e992c75062ff350
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.0-1ubuntu2.4_sparc.deb
Size/MD5: 323868 304cae7b60bf4c7c77523cbb62fc9e6d

Updated packages for Ubuntu 10.04:

Source archives:

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1.diff.gz
Size/MD5: 25851 33f5906cd8e8582e00e8baa1e5d54856
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1.dsc
Size/MD5: 1131 665431dec087634bbcad17f22921f418
https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1.orig.tar.gz
Size/MD5: 771059 4449d466a774f5ce401c9c0e3866c026

amd64 architecture (Athlon64, Opteron, EM64T Xeon):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_amd64.deb
Size/MD5: 326542 f751940841d09c48d1e87c768f7e9356
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_amd64.deb
Size/MD5: 350420 88622f029bdf13205434aac8e647bd4f

i386 architecture (x86 compatible Intel/AMD):

https://security.ubuntu.com/ubuntu/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_i386.deb
Size/MD5: 312350 f833abff9e23e619bb97129e9b7b9257
https://security.ubuntu.com/ubuntu/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_i386.deb
Size/MD5: 334338 877a883d1c886abc15b1502f95e0532b

powerpc architecture (Apple Macintosh G3/G4/G5):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_powerpc.deb
Size/MD5: 321274 30e33ca134b61a4e6e7952032d7e639c
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_powerpc.deb
Size/MD5: 345158 ffff986a6af277e8035e840f922f3a16

sparc architecture (Sun SPARC/UltraSPARC):

https://ports.ubuntu.com/pool/main/s/sudo/sudo_1.7.2p1-1ubuntu5.1_sparc.deb
Size/MD5: 318478 f77a189b478f46fd930754adee2e7b1d
https://ports.ubuntu.com/pool/universe/s/sudo/sudo-ldap_1.7.2p1-1ubuntu5.1_sparc.deb
Size/MD5: 341708 4e38581147410e7ff4a61d6bbcd23bdd



--
Jamie Strandboge | https://www.canonical.com
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close