CVE-2013-1776
SUSE Linux Enterprise Desktop 10 SP4 for AMD64 and Intel EM64T,SUSE Linux Enterprise Desktop 10 SP4 for x86,SUSE Linux Enterprise Desktop 11 SP2,SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T,SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit,SUSE Linux Enterprise Server 10 SP3 LTSS for x86,SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T,SUSE Linux Enterprise Server 10 SP4 for IBM POWER,SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit,SUSE Linux Enterprise Server 10 SP4 for IPF,SUSE Linux Enterprise Server 10 SP4 for x86,SUSE Linux Enterprise Server 11 SP1 LTSS,SUSE Linux Enterprise Server 11 SP2,SUSE Linux Enterprise Server 11 SP2 for VMware
CVE-2013-1776, security advisory, novell, suse linux, suse, security, cve

CVE-2013-1776

Common Vulnerabilities and Exposures

[Previous] [Index] [Next]

Upstream information

CVE-2013-1776 at MITRE

Description

sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal. NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.

SUSE information

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.38
Vector AV:L/AC:M/Au:N/C:P/I:P/A:P
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
SUSE Bugzilla entries: 806921 [RESOLVED / FIXED], 817349 [RESOLVED / FIXED], 817350 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Linux Enterprise Desktop 11 SP2
  • sudo >= 1.7.6p2-0.2.12.1
Patchnames:
sledsp2-sudo
SUSE Linux Enterprise Server 11 SP1-LTSS
  • sudo >= 1.7.6p2-0.2.12.5
Patchnames:
slessp1-sudo
SUSE Linux Enterprise Server 11 SP2
  • sudo >= 1.7.6p2-0.2.12.1
Patchnames:
slessp2-sudo
SUSE Linux Enterprise Server for VMWare 11 SP2
  • sudo >= 1.7.6p2-0.2.12.1
Patchnames:
slessp2-sudo
SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP3 LTSS for x86
  • sudo >= 1.6.8p12-18.21.8
Builds
ZYPP Patch Nr: 8712
SUSE Linux Enterprise Desktop 11 SP2
SUSE Linux Enterprise Server 11 SP2
SUSE Linux Enterprise Server 11 SP2 for VMware
  • sudo >= 1.7.6p2-0.2.12.1
Builds
SAT Patch Nr: 7705
SUSE Linux Enterprise Server 11 SP1 LTSS
  • sudo >= 1.7.6p2-0.2.12.5
Builds
SAT Patch Nr: 8428
SUSE Linux Enterprise Desktop 10 SP4 for AMD64 and Intel EM64T
SUSE Linux Enterprise Desktop 10 SP4 for x86
SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T
SUSE Linux Enterprise Server 10 SP4 for IBM POWER
SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit
SUSE Linux Enterprise Server 10 SP4 for IPF
SUSE Linux Enterprise Server 10 SP4 for x86
  • sudo >= 1.6.9p23-0.18.1
Builds
ZYPP Patch Nr: 8562
openSUSE 12.3
  • sudo >= 1.8.6p3-3.5.1
  • sudo-debuginfo >= 1.8.6p3-3.5.1
  • sudo-debugsource >= 1.8.6p3-3.5.1
  • sudo-devel >= 1.8.6p3-3.5.1
Patchnames:
openSUSE-2013-221
openSUSE Evergreen 11.4
  • sudo >= 1.7.6p2-0.19.1
  • sudo-debuginfo >= 1.7.6p2-0.19.1
  • sudo-debugsource >= 1.7.6p2-0.19.1
Patchnames:
2013-45