Package: sudo
Version: 1.6.9p17-2
Severity: grave
Tags: security
Justification: user security hole


My understanding is that permission to sudoedit is granted by a line in
the sudoer file like this:

     user1 ALL = sudoedit /etc/network/interfaces

This works as expected (because the string sudoedit is a special case), eg

     us...@host1:~$ sudoedit /etc/network/interfaces

However, it also appears to grant access to sudo any executable called
'sudoedit' (if the appropriate parameters are passed in). For example, a
user executable in the home directory called sudoedit:

     #!/bin/sh
     whoami

can be invoked (and reports 'root') using

     us...@host1:~$ sudo ./sudoedit /etc/network/interfaces

I had expected (because sudoedit is a special case string) that it should
not match anything apart from invoking /usr/bin/sudoedit.

This problem was encountered with build 1.6.9p17 of sudo on a Debian Lenny
system. The issue was pointed out by 'slouching' on linuxquestions.org.
He also reported that this problem did not occur on an earlier version
sudo-1.6.8p12-12.el5.

-- System Information:
Debian Release: 5.0.4
    APT prefers stable
    APT policy: (990, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.30-bpo.1-686 (SMP w/1 CPU core)
Locale: LANG=en_AU.UTF-8, LC_CTYPE=en_AU.UTF-8 (charmap=ANSI_X3.4-1968)
(ignored: LC_ALL set to C)
Shell: /bin/sh linked to /bin/bash

Versions of packages sudo depends on:
ii  libc6                     2.7-18lenny2   GNU C Library: Shared
libraries
ii  libpam-modules            1.0.1-5+lenny1 Pluggable Authentication
Modules f
ii  libpam0g                  1.0.1-5+lenny1 Pluggable Authentication
Modules l

sudo recommends no packages.

sudo suggests no packages.

-- no debconf information



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to