sudo before 1.8.12 does not ensure that the TZ environment variable is associated with a zoneinfo file, which allows local users to open arbitrary files for read access (but not view file contents) by running a program within an sudo session, as demonstrated by interfering with terminal output, discarding kernel-log messages, or repositioning tape drives.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201504-02 | vendor advisory |
http://www.securitytracker.com/id/1033158 | vdb entry |
http://openwall.com/lists/oss-security/2014/10/15/24 | mailing list exploit third party advisory |
http://www.sudo.ws/alerts/tz.html | vendor advisory |
http://rhn.redhat.com/errata/RHSA-2015-1409.html | vendor advisory |