Mine has a different behaviour:
"$ ./sudo-exploit.sh
Sudo <= 1.6.9p18 local r00t exploit
by Kingcope/2008/www.com-winner.com
Please give me a program to run via sudo.
Allowed programs:"

mine says:

"clau...@mycroft:~$ sudo -K
clau...@mycroft:~$ sudo echo 1
[sudo] password for claudio:
1
clau...@mycroft:~$ ./sudo.sh
Sudo <= 1.6.9p18 local r00t exploit
by Kingcope/2008/www.com-winner.com
Please give me a program to run via sudo.
Allowed programs:
User claudio may run the following commands on this host:
    (ALL) ALL
"

It seems to me that your user (kees) is not a sudoer O_o and that is
strange

"You're likely running the left-over /tmp/xxxx from earlier sudo's."
And that's what I see as the real bug: I must not be able to use an old sudo 
(one that was 'sudo -K'ed) to gain root access...
But I think (and correct me if I am wrong) that it is another bug (as you 
said): "If you find that sudo is not cleaning the tty tickets correctly, please 
open a new bug"

-- 
Privilege Escalation Exploit with setenv or ALL (v. <= 1.6.9p18 )
https://bugs.launchpad.net/bugs/349075
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to