Activity log for bug #1512781
Date | Who | What changed | Old value | New value | Message |
---|---|---|---|---|---|
2015-11-03 16:35:04 | Dmitry Lapshin | bug | added bug | ||
2015-11-03 16:36:03 | Dmitry Lapshin | description | https://www.exploit-db.com/exploits/37710/ As descpribed in the link above, sudo versions lower or equal than 1.8.14 have a security issue: user with root access to a path with more than one wildcard can access forbidden files such as /etc/shadow, because sudoedit (sudo -e) does not verifiy full path of accessed file: (quote from link above) It seems that sudoedit does not check the full path if a wildcard is used twice (e.g. /home/*/*/file.txt), allowing a malicious user to replace the file.txt real file with a symbolic link to a different location (e.g. /etc/shadow). As an expample, 1. Give user `usr' right to edit some his files: usr ALL=(root) NOPASSWD: sudoedit /home/*/*/test.txt 2. Under usr, create ~/temp directory, and then create a symblink ~/temp/test.txt to /etc/shadow 3. Perform sudoedit ~/temp/test.txt - you will able to access /etc/shadow. What realease if affected: tested on all supported now Ubuntu versions. For personaly me, it's 14.04 LTS. What version is affected: as mentioned, all versions <=1.8.14. For personally me, it's 1.8.9.5 What was expected and happend instead: sudoedit should check full real path, but it didn't. | https://www.exploit-db.com/exploits/37710/ As descpribed in the link above, sudo versions lower or equal than 1.8.14 have a security issue: user with root access to a path with more than one wildcard can access forbidden files such as /etc/shadow, because sudoedit (sudo -e) does not verifiy full path of accessed file: (quote from link above) It seems that sudoedit does not check the full path if a wildcard is used twice (e.g. /home/*/*/file.txt), allowing a malicious user to replace the file.txt real file with a symbolic link to a different location (e.g. /etc/shadow). As an expample, 1. Give user `usr' right to edit some his files: usr ALL=(root) NOPASSWD: sudoedit /home/*/*/test.txt 2. Under usr, create ~/temp directory, and then create a symblink ~/temp/test.txt to /etc/shadow 3. Perform sudoedit ~/temp/test.txt - you will able to access /etc/shadow. What realease is affected: tested on all supported now Ubuntu versions. For personaly me, it's 14.04 LTS. What version is affected: as mentioned, all versions <=1.8.14. For personally me, it's 1.8.9p5 What was expected and happend instead: sudoedit should check full real path, but it didn't. | |
2015-11-03 16:36:31 | Dmitry Lapshin | summary | CVE-2015-5602 - Unauthorized Privilege | CVE-2015-5602 - Unauthorized Privilege Escalation | |
2015-11-03 16:51:23 | Marc Deslauriers | information type | Private Security | Public Security | |
2015-11-03 16:51:31 | Marc Deslauriers | nominated for series | Ubuntu Precise | ||
2015-11-03 16:51:31 | Marc Deslauriers | bug task added | sudo (Ubuntu Precise) | ||
2015-11-03 16:51:31 | Marc Deslauriers | nominated for series | Ubuntu Wily | ||
2015-11-03 16:51:31 | Marc Deslauriers | bug task added | sudo (Ubuntu Wily) | ||
2015-11-03 16:51:31 | Marc Deslauriers | nominated for series | Ubuntu Trusty | ||
2015-11-03 16:51:31 | Marc Deslauriers | bug task added | sudo (Ubuntu Trusty) | ||
2015-11-03 16:51:31 | Marc Deslauriers | nominated for series | Ubuntu Xenial | ||
2015-11-03 16:51:31 | Marc Deslauriers | bug task added | sudo (Ubuntu Xenial) | ||
2015-11-03 16:51:31 | Marc Deslauriers | nominated for series | Ubuntu Vivid | ||
2015-11-03 16:51:31 | Marc Deslauriers | bug task added | sudo (Ubuntu Vivid) | ||
2015-11-03 16:52:06 | Marc Deslauriers | sudo (Ubuntu Precise): status | New | Confirmed | |
2015-11-03 16:52:10 | Marc Deslauriers | sudo (Ubuntu Trusty): status | New | Confirmed | |
2015-11-03 16:52:12 | Marc Deslauriers | sudo (Ubuntu Vivid): status | New | Confirmed | |
2015-11-03 16:52:15 | Marc Deslauriers | sudo (Ubuntu Wily): status | New | Confirmed | |
2015-11-03 16:52:18 | Marc Deslauriers | sudo (Ubuntu Xenial): status | New | Confirmed | |
2015-11-03 17:46:08 | Seth Arnold | attachment added | o_nofollow.c https://bugs.launchpad.net/ubuntu/+source/sudo/+bug/1512781/+attachment/4512250/+files/o_nofollow.c | ||
2015-11-05 13:10:21 | Laurent Bigonville | cve linked | 2015-5602 | ||
2015-11-05 13:21:02 | Laurent Bigonville | bug watch added | http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=804149 | ||
2015-11-05 13:21:02 | Laurent Bigonville | bug task added | sudo (Debian) | ||
2015-11-05 15:00:44 | Bug Watch Updater | sudo (Debian): status | Unknown | Confirmed | |
2015-11-05 22:55:35 | Marc Deslauriers | bug watch added | http://bugzilla.sudo.ws/show_bug.cgi?id=707 | ||
2015-11-05 22:55:35 | Marc Deslauriers | bug task added | sudo | ||
2016-01-19 18:11:28 | Bug Watch Updater | sudo (Debian): status | Confirmed | Fix Released | |
2016-03-08 21:50:16 | Simon Déziel | bug | added subscriber Simon Déziel | ||
2016-04-20 16:52:12 | Marc Deslauriers | sudo (Ubuntu Xenial): status | Confirmed | Fix Released | |
2021-10-14 02:24:45 | Steve Langasek | sudo (Ubuntu Precise): status | Confirmed | Won't Fix |