On Wed, Dec 11, 2013 at 10:56 PM, Ralf Mardorf
<ralf.mard...@alice-dsl.net> wrote:
>
> http://www.paritynews.com/2013/03/05/762/sudo-authentication-bypass-vulnerability-emerges/
>
> But note! The Chaos Computer Club does publish howtos using sudo on
> Linux: http://muc.ccc.de/uberbus:ubd
>
> I don't think the Chaos Computer Club folks would write a howto using
> sudo, if sudo would be a security risk.

"There are few prerequisites for the attack to work: the user much be
listed in the /etc/sudoers file; must have successfully authenticated
to execute a sudo command once; and it must be possible for users to
modify the system time without entering a password."

Having someone upgrade his/her sudo privileges to "NOPASSWD:" isn't
good but it isn't the end of the world when compared to an external
attacker getting access to a system.


-- 
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org 
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/CAOdo=szj6ftmu-b-fnehhmhywgeuk+4+49g+psrksi7x0jj...@mail.gmail.com

Reply via email to