OracleVM 3.2 : sudo (OVMSA-2016-0079)

medium Nessus Plugin ID 91755

Synopsis

The remote OracleVM host is missing a security update.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- added patch for CVE-2014-0106: certain environment variables not sanitized when env_reset is disabled Resolves: rhbz#1072210

- backported fixes for CVE-2013-1775 CVE-2013-1776 (CVE-2013-2776) CVE-2013-2777 Resolves: rhbz#968221

- visudo: fixed incorrect warning and parse error regarding undefined aliases which were in fact defined Resolves: rhbz#849679 Resolves: rhbz#905624

- updated sudoers man-page to clarify the behavior of the user negation operator and the behavior of wildcard matching in command specifications Resolves: rhbz#846118 Resolves: rhbz#856902

- fixed regression in escaping of sudo -i arguments Resolves: rhbz#853203

- bump release number

- Fixed caching of user and group names

- Backported RFC 4515 escaping of LDAP queries Resolves:
rhbz#855836 Resolves: rhbz#869287

- Add the -c option to sed commands in post/postun scripts Resolves: rhbz#818585

- Implement a new sudoers Defaults option to restore old command exec behavior Resolves: rhbz#840971

- Add ability to treat files authoritatively in sudoers.ldap Resolves: rhbz#840097

- Changed policycoreutils dependency to a context specific dependency (post & postun) Resolves: rhbz#846694

- don't use a temporary file when modifying nsswitch.conf

- fix permissions on nsswitch.conf, if needed Resolves:
rhbz#846631

- added a workaround for a race condition in handling child processes Resolves: rhbz#829263

- use safe temporary files in post/postun scripts

- corrected postun script Resolves: rhbz#841070

- corrected release number

- call restorecon after modifying nsswitch.conf in the postun scriplet

- added policycoreutils dependency Resolves: rhbz#818585

- fixed `sudo -i' command escaping (#806073)

- fixed multiple sudoHost LDAP attr. handlng (#740884) Resolves: rhbz#740884 Resolves: rhbz#806073

Solution

Update the affected sudo package.

See Also

https://oss.oracle.com/pipermail/oraclevm-errata/2016-June/000493.html

Plugin Details

Severity: Medium

ID: 91755

File Name: oraclevm_OVMSA-2016-0079.nasl

Version: 2.6

Type: local

Published: 6/22/2016

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:sudo, cpe:/o:oracle:vm_server:3.2

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/21/2016

Vulnerability Publication Date: 3/5/2013

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Mac OS X Sudo Password Bypass)

Reference Information

CVE: CVE-2013-1775, CVE-2013-1776, CVE-2013-2776, CVE-2013-2777, CVE-2014-0106

BID: 58203, 58207, 62741, 65997