Forum » Informacijska varnost » sudo privilege escalation (CVE-2021-3156/Baron Samedit)
sudo privilege escalation (CVE-2021-3156/Baron Samedit)
![](https://static.slo-tech.com/stili/avatar_gray.gif)
predi ::
https://www.bleepingcomputer.com/news/s...
Posodobite sudo na svojih Linux sistemih.
Posodobite sudo na svojih Linux sistemih.
The Sudo privilege escalation vulnerability tracked as CVE-2021-3156 (aka Baron Samedit) was discovered by security researchers from Qualys, who disclosed it on January 13th and made sure that patches are available before going public with their findings.
According to Qualys researchers, the issue is a heap-based buffer overflow exploitable by any local user (normal users and system users, listed in the sudoers file or not), with attackers not being required to know the user's password to successfully exploit the flaw.
The buffer overflow allowing any local user to obtain root privileges is triggered by Sudo incorrectly unescaping backslashes in the arguments.
"Normally, sudo escapes special characters when running a command via a shell (sudo -s or sudo -i)," the 1.9.5p2 changelog reads.
"However, it was also possible to run sudoedit with the -s or -i flags in which case no escaping had actually been done, making a buffer overflow possible."
Qualys created three CVE-2021-3156 exploits to showcase how this vulnerability can be successfully abused by potential attackers.
Using these exploits, the researchers were able to obtain full root privileges on multiple Linux distributions, including Debian 10 (Sudo 1.8.27), Ubuntu 20.04 (Sudo 1.8.31), and Fedora 33 (Sudo 1.9.2).
Other operating systems and distributions supported by Sudo are probably also exploitable using CVE-2021-3156 exploits according to Qualys.
Further technical details on how CVE-2021-3156 can be exploited are available in Qualys' CVE-2021-3156 security advisory published on Tuesday.
To test if your system is vulnerable, you have to login as a non-root user and run the "sudoedit -s /" command. Vulnerable systems will throw an error starting with "sudoedit:" while patched ones will display an error starting with "usage:" .
System admins who use Sudo to delegate root privileges to their users should immediately upgrade to sudo 1.9.5p2 or later as soon as possible.
![](https://static.slo-tech.com/stili/avatar_gray.gif)
c3p0 ::
No, "any user"... Na pravilno setuppanem sistemu moraš najprej bit v pravi skupini, da sploh imaš dostop do sudo ukaza.
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Randomness ::
Na pravilno setuppanem sistemu moraš najprej bit v pravi skupini, da sploh imaš dostop do sudo ukaza.Poznas katero distribucijo Linuxa, ki ima "pravilno setuppan" sistem ze privzeto?
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Rias Gremory ::
@OP
Hvala za opozorilo.
Sem lih danes na Debian-based distribuciji dobil posodobitev za sudo. Upam, da je to to.
Hvala za opozorilo.
Sem lih danes na Debian-based distribuciji dobil posodobitev za sudo. Upam, da je to to.
Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.
saj za časa našega življenja ne bo popolnoma propadel.
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Rias Gremory ::
Jap, to je to: https://www.debian.org/security/2021/ds...
Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.
saj za časa našega življenja ne bo popolnoma propadel.
![](https://static.slo-tech.com/stili/bel_non_grata.png)
Invictus ::
Saj obstaja dovolj tem na internetu, kako se pravilno nastavi UNIX po inštalaciji...
Je tam nekje 25-40 korakov, pač odvisno koliko kompliciraš...
Je tam nekje 25-40 korakov, pač odvisno koliko kompliciraš...
"Life is hard; it's even harder when you're stupid."
http://goo.gl/2YuS2x
http://goo.gl/2YuS2x
![](https://static.slo-tech.com/stili/bel_non_grata.png)
nergac ::
Nisem ravno strokovnjak, ampak a ni recimo malce problematično, da Ubuntu in njegove izpeljanke pri inštalaciji zahtevajo samo eno geslo, ki je administrativno.
Saj kasneje lahko nastaviš, ampak privzeto je tako.
Saj kasneje lahko nastaviš, ampak privzeto je tako.
![](https://static.slo-tech.com/stili/bel_non_grata.png)
Invictus ::
Ja, je, ampak to je za uporabnike... načeloma to niso strežniki.
Tale lista je precej dobra... Uporabiš, kar misliš, da je pametno...
https://www.cyberciti.biz/tips/linux-se...
Tale lista je precej dobra... Uporabiš, kar misliš, da je pametno...
https://www.cyberciti.biz/tips/linux-se...
"Life is hard; it's even harder when you're stupid."
http://goo.gl/2YuS2x
http://goo.gl/2YuS2x
![](https://static.slo-tech.com/stili/avatar_gray.gif)
PARTyZAN ::
Za hardening obstaja tudi CIS benchmark dokument, v repozitorijih večjih distribucij je tudi lynis bash skripta, ki ti da score in izpostavi potencialne izboljšave.
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Randomness ::
Je tam nekje 25-40 korakov, pač odvisno koliko kompliciraš...In kateri izmed teh korakov naredi, da sudo ni dostopen vsakemu uporabniku?
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Randomness ::
Ne, to ne zadošča. sudo lahko še vedno zažene vsak uporabnik:
-rwsr-xr-x 1 root root 165976 Jan 26 19:34 /usr/bin/sudo
![](https://static.slo-tech.com/stili/avatar_gray.gif)
c3p0 ::
Randomness je izjavil:
Ne, to ne zadošča. sudo lahko še vedno zažene vsak uporabnik:-rwsr-xr-x 1 root root 165976 Jan 26 19:34 /usr/bin/sudo
Morda je dovolj že
chmod o-rx+s /usr/bin/sudo && chgrp sudo /usr/bin/sudo
Nato userja dodaš v sudo group:
addgroup USER sudo
Pomisleki so na mestu. Če binary ima privzeto +s in komaj nekje po zagonu ukaza preverja ali je user v pravi skupini (saj drugače ne more), se lahko exploita kak bug pred to rutino in voila:
uid=0(root) gid=0(root).
Zgodovina sprememb…
- spremenil: c3p0 ()
![](https://static.slo-tech.com/stili/bel_non_grata.png)
Invictus ::
Ker se je nekdo tako odločil...
"Life is hard; it's even harder when you're stupid."
http://goo.gl/2YuS2x
http://goo.gl/2YuS2x
![](https://static.slo-tech.com/stili/avatar_gray.gif)
HotBurek ::
Sem včeraj dobil to sporočilo za update na strežniku... in odstranil sudo.
user@debian:~$ sudo
bash: sudo: command not found
user@debian:~$
Ker ne uporabljam sudo.
Vedno naredim login z navadnim userjem, nato prvi ukaz su, da grem v root, potem pa začnem delat.
user@debian:~$ sudo
bash: sudo: command not found
user@debian:~$
Ker ne uporabljam sudo.
Vedno naredim login z navadnim userjem, nato prvi ukaz su, da grem v root, potem pa začnem delat.
root@debian:/# iptraf-ng
fatal: This program requires a screen size of at least 80 columns by 24 lines
Please resize your window
fatal: This program requires a screen size of at least 80 columns by 24 lines
Please resize your window
![](https://static.slo-tech.com/stili/bel_non_grata.png)
nergac ::
Ubuntu je bil samo vmesna stopnja med XP in debianom.
Si pa ponavadi zapomnim vsako neumnost in se je ne morem rešiti ...
Si pa ponavadi zapomnim vsako neumnost in se je ne morem rešiti ...
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Lonsarg ::
Statistično je čisto enako verjetno, da bo naslednjič exploit na su komandi. Tak da z neuporabo sudo ne pridobiš nič.
Zgodovina sprememb…
- spremenil: Lonsarg ()
![](https://static.slo-tech.com/stili/avatar_gray.gif)
Rias Gremory ::
Openbox master race.
Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.
saj za časa našega življenja ne bo popolnoma propadel.
![](https://static.slo-tech.com/stili/avatar_gray.gif)
poweroff ::
Ja, je, ampak to je za uporabnike... načeloma to niso strežniki.
Tale lista je precej dobra... Uporabiš, kar misliš, da je pametno...
https://www.cyberciti.biz/tips/linux-se...
Zelo dober seznam, ja. Edino malo zastarel je, točka 16 (Disable Unwanted Linux Services) se danes preverja malo drugače. Če imaš Upstart, potem rečeš
sudo initctl list, System V (ta je danes kar privzeti) pa
sudo service --status-allter recimo
sudo systemctl list-unit-files --type=service
Onemogočanje USB/firewire/thunderbolt naprav se mi zdi tak nice touch, ampak jaz raje uporabljam USBGuard.
Mimogrede, noowner datoteke so na desktopu po navadi... tadaaaa: Adobe Acrobat Reader. Yup, that crap.
sudo poweroff
Vredno ogleda ...
Tema | Ogledi | Zadnje sporočilo | |
---|---|---|---|
Tema | Ogledi | Zadnje sporočilo | |
! | [(K)Ubuntu] Vprašanja in težave (strani: 1 2 3 4 … 20 21 22 23 )Oddelek: Operacijski sistemi | 343736 (1623) | polozweii |
» | Izguba administratorskih pravic kot sudo uporabnik (strani: 1 2 )Oddelek: Pomoč in nasveti | 12658 (10605) | SeMiNeSanja |
» | problem pri sprembi root gesla v MySQL v UbuntuOddelek: Pomoč in nasveti | 1294 (874) | killa bee |
» | AppArmor in Skype na UbuntuOddelek: Programska oprema | 1268 (1144) | poweroff |
» | Update SVN preko Apache (PHP)Oddelek: Operacijski sistemi | 1056 (998) | Karlos |