sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.
Link | Tags |
---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02%3A06.asc | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2002-013.html | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/7891 | vdb entry |
http://www.securityfocus.com/advisories/3800 | vendor advisory |
http://www.securityfocus.com/bid/3871 | vdb entry |
http://www.securityfocus.com/archive/1/250168 | mailing list vendor advisory |
http://marc.info/?l=bugtraq&m=101120193627756&w=2 | mailing list |
http://www.sudo.ws/sudo/alerts/postfix.html | |
http://www.novell.com/linux/security/advisories/2002_002_sudo_txt.html | vendor advisory |
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:003 | vendor advisory |
http://www.debian.org/security/2002/dsa-101 | vendor advisory |
http://www.redhat.com/support/errata/RHSA-2002-011.html | vendor advisory |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000451 | vendor advisory |