A security issue has been reported in Sudo, which can be exploited by malicious, local users to bypass certain security restrictions.
The security issue is caused due to the "secure path" feature only verifying and restricting the first instance of the "PATH" environment variable, which can be exploited to e.g. run restricted applications by adding a second instance of the "PATH" environment variable.
Successful exploitation requires that the "secure path" feature is configured and that the attacker is allowed to run an application, which e.g. uses the last instance of the "PATH" environment variable and does not set "PATH" itself (e.g. GNU Bourne Again SHell).
The security issue is reported in versions 1.3.1 through 1.6.9p22 and versions 1.7.0 through 1.7.2p6.
Solution: Update to version 1.6.9p23 and 1.7.2p7.
Provided and/or discovered by: The vendor credits Evan Broder and Anders Kaseorg of Ksplice, Inc.
Original Advisory: http://www.sudo.ws/sudo/alerts/secure_path.html
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to email@example.com