Package: sudo
Version: 1.7.4p4-2.squeeze.2
Severity: important
Tags: security


If root runs a command as a less priviledged user with "sudo -u", if the user
was compromised, the script will be able to run commands as root by injecting
keystrokes on the terminal.

This is the same problem as #628843 - the exploit code referenced there works
with sudo, too.

cu

AW
-- System Information:
Debian Release: 6.0.3
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable'), (50, 'proposed-updates')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/2 CPU cores)
Locale: LANG=C, LC_CTYPE=de_DE (charmap=ISO-8859-1)
Shell: /bin/sh linked to /bin/dash

Versions of packages sudo depends on:
ii  libc6                 2.11.3-2           Embedded GNU C Library: Shared lib
ii  libpam-modules        1.1.1-6.1+squeeze1 Pluggable Authentication Modules f
ii  libpam0g              1.1.1-6.1+squeeze1 Pluggable Authentication Modules l

sudo recommends no packages.

sudo suggests no packages.

-- Configuration Files:
/etc/sudoers.d/README [Errno 13] Permission denied: u'/etc/sudoers.d/README'

-- no debconf information



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to