Executive Summary

Summary
Title Sudo vulnerability
Informations
NameUSN-4263-2First vendor Publication2020-02-05
VendorUbuntuLast vendor Modification2020-02-05
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base ScoreN/AAttack RangeN/A
Cvss Impact ScoreN/AAttack ComplexityN/A
Cvss Expoit ScoreN/AAuthenticationN/A
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM - Ubuntu 12.04 ESM

Summary:

Sudo could allow unintended access to the administrator account.

Software Description: - sudo: Provide limited super user privileges to specific users

Details:

USN-4263-1 fixed a vulnerability in Sudo. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Joe Vennix discovered that Sudo incorrectly handled memory operations when
the pwfeedback option is enabled. A local attacker could possibly use this
issue to obtain unintended access to the administrator account.

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM:
sudo 1.8.9p5-1ubuntu1.5+esm3
sudo-ldap 1.8.9p5-1ubuntu1.5+esm3

Ubuntu 12.04 ESM:
sudo 1.8.3p1-1ubuntu3.9
sudo-ldap 1.8.3p1-1ubuntu3.9

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4263-2
https://usn.ubuntu.com/4263-1
CVE-2019-18634

Original Source

Url : http://www.ubuntu.com/usn/USN-4263-2

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2020-02-05 17:17:53
  • First insertion