First published: Thu Nov 19 2015(Updated: )
A vulnerability in functionality for adding support of SHA-2 digests along with the command was found. The sudoers plugin performs this digest verification while matching rules, and later independently calls execve() to execute the binary. This results in a race condition if the digest functionality is used as suggested (in fact, the rules are matched before the user is prompted for a password, so there is not negligible time frame to replace the binary from underneath sudo). Versions affected are since 1.8.7. CVE assignment: <a href="http://seclists.org/oss-sec/2015/q4/327">http://seclists.org/oss-sec/2015/q4/327</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Todd Miller Sudo | >=1.8.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.