【漏洞公告】CVE-2017-1000367:Sudo本地提权漏洞
Re【漏洞公告】CVE-2017-1000367Sudo本地提权漏洞
引用楼主正禾于2017-05-31 10:19发表的 【漏洞公告】CVE-2017-1000367:Sudo本地提权漏洞 :
2017年5月30日,国外安全研究人员发现Linux环境下,可以通过sudo实现本地提权漏洞,漏洞编号为CVE-2017-1000367,该漏洞几乎影响了所有Linux系统。
阿里云云盾提醒您关注并及时更新补丁,避免攻击者利用该漏洞提权攻击。
具体详情如下:
漏洞编号:
CVE-2017-1000367
....... [url=https://bbs.aliyun.com/job.php?action=topost&tid=317299&pid=tpc][/url]
为什么最关键的selinux部分没有了?
On an SELinux-enabled system, if a user is Sudoer for a command that
does not grant him full root privileges, he can overwrite any file on
the filesystem (including root-owned files) with his command's output,
because relabel_tty() (in src/selinux.c) calls open(O_RDWR|O_NONBLOCK)
on his tty and dup2()s it to the command's stdin, stdout, and stderr.
This allows any Sudoer user to obtain full root privileges.
“On an SELinux-enabled system”
阿里云镜像默认,都是 disabled的,所以基本不受影响。除非重新开启。
赞0
踩0