Mine has a different behaviour:
"$ ./sudo-exploit.sh
Sudo <= 1.6.9p18 local r00t exploit
by Kingcope/2008/www.com-winner.com
Please give me a program to run via sudo.
Allowed programs:"
mine says:
"clau...@mycroft:~$ sudo -K
clau...@mycroft:~$ sudo echo 1
[sudo] password for claudio:
1
clau...@mycroft:~$ ./sudo.sh
Sudo <= 1.6.9p18 local r00t exploit
by Kingcope/2008/www.com-winner.com
Please give me a program to run via sudo.
Allowed programs:
User claudio may run the following commands on this host:
(ALL) ALL
"
It seems to me that your user (kees) is not a sudoer O_o and that is
strange
"You're likely running the left-over /tmp/xxxx from earlier sudo's."
And that's what I see as the real bug: I must not be able to use an old sudo
(one that was 'sudo -K'ed) to gain root access...
But I think (and correct me if I am wrong) that it is another bug (as you
said): "If you find that sudo is not cleaning the tty tickets correctly, please
open a new bug"
--
Privilege Escalation Exploit with setenv or ALL (v. <= 1.6.9p18 )
https://bugs.launchpad.net/bugs/349075
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs