aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwxs <wxs@FreeBSD.org>2013-03-01 10:08:30 +0800
committerwxs <wxs@FreeBSD.org>2013-03-01 10:08:30 +0800
commitd4210c620c3ee7110f9380a982af8e2f5e6cc7dd (patch)
tree8c55677327ae29955e5db173bdf6d04c32f5c175 /security
parent2dbcf97bd3a4c6587f30022b817086ef19666c87 (diff)
downloadfreebsd-ports-gnome-d4210c620c3ee7110f9380a982af8e2f5e6cc7dd.tar.gz
freebsd-ports-gnome-d4210c620c3ee7110f9380a982af8e2f5e6cc7dd.tar.zst
freebsd-ports-gnome-d4210c620c3ee7110f9380a982af8e2f5e6cc7dd.zip
Document two sudo problems.
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml61
1 files changed, 61 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index df5818daae8b..8899673cb600 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -51,6 +51,67 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="764344fb-8214-11e2-9273-902b343deec9">
+ <topic>sudo -- Authentication bypass when clock is reset</topic>
+ <affects>
+ <package>
+ <name>sudo</name>
+ <range><lt>1.8.6.p7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Todd Miller reports:</p>
+ <blockquote cite="http://www.sudo.ws/sudo/alerts/epoch_ticket.html">
+ <p>The flaw may allow someone with physical access to a machine that
+ is not password-protected to run sudo commands without knowing the
+ logged in user's password. On systems where sudo is the principal
+ way of running commands as root, such as on Ubuntu and Mac OS X,
+ there is a greater chance that the logged in user has run sudo
+ before and thus that an attack would succeed.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-1775</cvename>
+ <url>http://www.sudo.ws/sudo/alerts/epoch_ticket.html</url>
+ </references>
+ <dates>
+ <discovery>2013-02-27</discovery>
+ <entry>2013-03-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="82cfd919-8213-11e2-9273-902b343deec9">
+ <topic>sudo -- Potential bypass of tty_tickets constraints</topic>
+ <affects>
+ <package>
+ <name>sudo</name>
+ <range><lt>1.8.6.p7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Todd Miller reports:</p>
+ <blockquote cite="http://www.sudo.ws/sudo/alerts/tty_tickets.html">
+ <p>A (potentially malicious) program run by a user with sudo access
+ may be able to bypass the "tty_ticket" constraints. In order for
+ this to succeed there must exist on the machine a terminal device
+ that the user has previously authenticated themselves on via sudo
+ within the last time stamp timeout (5 minutes by default).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2013-1776</cvename>
+ <url>http://www.sudo.ws/sudo/alerts/tty_tickets.html</url>
+ </references>
+ <dates>
+ <discovery>2013-02-27</discovery>
+ <entry>2013-03-01</entry>
+ </dates>
+ </vuln>
+
<vuln vid="aa7764af-0b5e-4ddc-bc65-38ad697a484f">
<topic>rubygem-dragonfly -- arbitrary code execution</topic>
<affects>