Bug 916363 (CVE-2013-1775)
Summary: | CVE-2013-1775 sudo: authentication bypass via reset system clock | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | agunn, dkopecek, jsightle, kzak, stefan.sels |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | sudo 1.7.10p7, sudo 1.8.6p7 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-11-22 05:31:12 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 916367, 968221, 1015355 | ||
Bug Blocks: | 916366, 952520, 974906 |
Description
Vincent Danen
2013-02-27 22:36:45 UTC
Created sudo tracking bugs for this issue Affects: fedora-all [bug 916367] sudo-1.8.6p7-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. sudo-1.8.6p7-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1353 https://rhn.redhat.com/errata/RHSA-2013-1353.html This issue has been classified as low security impact, because of the following reasons. 1. A user already needs to have sudo access on the target machine. 2. The user needs to have permission to set system clock on the target machine. This is uncommon and may only be used for some desktop configurations. 3. Successful exploitation of this issue, only results in bypass of sudo cache credential timeout, it does not provide any additional privileges to the attacker. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1701 https://rhn.redhat.com/errata/RHSA-2013-1701.html Statement: (none) |