漏洞类别:Amazon Linux
漏洞等级:
漏洞信息
It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system() or popen() C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use this flaw to execute arbitrary commands with elevated privileges. (CVE-2016-7032 )
It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed wordexp() C library function with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could possibly use this flaw to execute arbitrary commands with elevated privileges. (CVE-2016-7076 )
漏洞危害
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
解决方案
Please refer to Amazon advisory ALAS-2017-780 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
ALAS-2017-780: Amazon Linux (sudo (1.8.6p3-25.23.amzn1) on i686)
ALAS-2017-780: Amazon Linux (sudo (1.8.6p3-25.23.amzn1) on x86_64)
ALAS-2017-780: Amazon Linux (sudo (1.8.6p3-25.23.amzn1) on src)
上一篇:CVE-2016-1248
0day
文章评论