» »

sudo privilege escalation (CVE-2021-3156/Baron Samedit)

sudo privilege escalation (CVE-2021-3156/Baron Samedit)

predi ::

https://www.bleepingcomputer.com/news/s...

Posodobite sudo na svojih Linux sistemih.

The Sudo privilege escalation vulnerability tracked as CVE-2021-3156 (aka Baron Samedit) was discovered by security researchers from Qualys, who disclosed it on January 13th and made sure that patches are available before going public with their findings.

According to Qualys researchers, the issue is a heap-based buffer overflow exploitable by any local user (normal users and system users, listed in the sudoers file or not), with attackers not being required to know the user's password to successfully exploit the flaw.

The buffer overflow allowing any local user to obtain root privileges is triggered by Sudo incorrectly unescaping backslashes in the arguments.

"Normally, sudo escapes special characters when running a command via a shell (sudo -s or sudo -i)," the 1.9.5p2 changelog reads.

"However, it was also possible to run sudoedit with the -s or -i flags in which case no escaping had actually been done, making a buffer overflow possible."

Qualys created three CVE-2021-3156 exploits to showcase how this vulnerability can be successfully abused by potential attackers.

Using these exploits, the researchers were able to obtain full root privileges on multiple Linux distributions, including Debian 10 (Sudo 1.8.27), Ubuntu 20.04 (Sudo 1.8.31), and Fedora 33 (Sudo 1.9.2).

Other operating systems and distributions supported by Sudo are probably also exploitable using CVE-2021-3156 exploits according to Qualys.

Further technical details on how CVE-2021-3156 can be exploited are available in Qualys' CVE-2021-3156 security advisory published on Tuesday.
To test if your system is vulnerable, you have to login as a non-root user and run the "sudoedit -s /" command. Vulnerable systems will throw an error starting with "sudoedit:" while patched ones will display an error starting with "usage:" .

System admins who use Sudo to delegate root privileges to their users should immediately upgrade to sudo 1.9.5p2 or later as soon as possible.

c3p0 ::

No, "any user"... Na pravilno setuppanem sistemu moraš najprej bit v pravi skupini, da sploh imaš dostop do sudo ukaza.

Randomness ::

Na pravilno setuppanem sistemu moraš najprej bit v pravi skupini, da sploh imaš dostop do sudo ukaza.
Poznas katero distribucijo Linuxa, ki ima "pravilno setuppan" sistem ze privzeto?

Rias Gremory ::

@OP
Hvala za opozorilo.
Sem lih danes na Debian-based distribuciji dobil posodobitev za sudo. Upam, da je to to.
Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.

Rias Gremory ::

Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.

Randomness ::

@c3p0 Lahko malo vec o tem, kaj zate pomeni pravilno setuppan sistem?

Invictus ::

Saj obstaja dovolj tem na internetu, kako se pravilno nastavi UNIX po inštalaciji...

Je tam nekje 25-40 korakov, pač odvisno koliko kompliciraš...
"Life is hard; it's even harder when you're stupid."

http://goo.gl/2YuS2x

nergac ::

Nisem ravno strokovnjak, ampak a ni recimo malce problematično, da Ubuntu in njegove izpeljanke pri inštalaciji zahtevajo samo eno geslo, ki je administrativno.

Saj kasneje lahko nastaviš, ampak privzeto je tako.

Invictus ::

Ja, je, ampak to je za uporabnike... načeloma to niso strežniki.

Tale lista je precej dobra... Uporabiš, kar misliš, da je pametno...

https://www.cyberciti.biz/tips/linux-se...
"Life is hard; it's even harder when you're stupid."

http://goo.gl/2YuS2x

PARTyZAN ::

Za hardening obstaja tudi CIS benchmark dokument, v repozitorijih večjih distribucij je tudi lynis bash skripta, ki ti da score in izpostavi potencialne izboljšave.

Randomness ::

Je tam nekje 25-40 korakov, pač odvisno koliko kompliciraš...
In kateri izmed teh korakov naredi, da sudo ni dostopen vsakemu uporabniku?

Invictus ::

Uporabnike izbrišeš iz sudoers fila...

https://www.digitalocean.com/community/...
"Life is hard; it's even harder when you're stupid."

http://goo.gl/2YuS2x

Randomness ::

Ne, to ne zadošča. sudo lahko še vedno zažene vsak uporabnik:
-rwsr-xr-x 1 root root 165976 Jan 26 19:34 /usr/bin/sudo

Invictus ::

"Life is hard; it's even harder when you're stupid."

http://goo.gl/2YuS2x

Randomness ::

Ne pomaga, če exec pravice niso omejene na grupo, kar privzeto niso.

c3p0 ::

Randomness je izjavil:

Ne, to ne zadošča. sudo lahko še vedno zažene vsak uporabnik:
-rwsr-xr-x 1 root root 165976 Jan 26 19:34 /usr/bin/sudo


Morda je dovolj že
chmod o-rx+s /usr/bin/sudo && chgrp sudo /usr/bin/sudo


Nato userja dodaš v sudo group:
addgroup USER sudo


Pomisleki so na mestu. Če binary ima privzeto +s in komaj nekje po zagonu ukaza preverja ali je user v pravi skupini (saj drugače ne more), se lahko exploita kak bug pred to rutino in voila:
uid=0(root) gid=0(root)
.

Zgodovina sprememb…

  • spremenil: c3p0 ()

Randomness ::

Ja, to bi šlo. Ne vem sicer, zakaj ni tako narejeno že privzeto. ???

Invictus ::

Ker se je nekdo tako odločil...
"Life is hard; it's even harder when you're stupid."

http://goo.gl/2YuS2x

HotBurek ::

Sem včeraj dobil to sporočilo za update na strežniku... in odstranil sudo.

user@debian:~$ sudo
bash: sudo: command not found
user@debian:~$


Ker ne uporabljam sudo.

Vedno naredim login z navadnim userjem, nato prvi ukaz su, da grem v root, potem pa začnem delat.
root@debian:/# iptraf-ng
fatal: This program requires a screen size of at least 80 columns by 24 lines
Please resize your window

nergac ::

Enako.

Včasih se še zmotim in napišem "sudo su" namesto "su" in potem me debian "krega".

pegasus ::

Jah, niste še z ubuntujem okuženi ;)

nergac ::

Ubuntu je bil samo vmesna stopnja med XP in debianom.

Si pa ponavadi zapomnim vsako neumnost in se je ne morem rešiti ...

Lonsarg ::

Statistično je čisto enako verjetno, da bo naslednjič exploit na su komandi. Tak da z neuporabo sudo ne pridobiš nič.

Zgodovina sprememb…

  • spremenil: Lonsarg ()

nergac ::

Spašujem za uporabnike in ne serverje:

kaj je več v uporabi, Ubuntu ali Debian?

pegasus ::

CentOS :P

nergac ::

Logična izbira glede na tvoje potrebe.

Gnome ali kde?

pegasus ::

Xfce.

nergac ::

MATE.

Rias Gremory ::

Openbox master race.
Mirno gledamo, kako naš svet propada,
saj za časa našega življenja ne bo popolnoma propadel.

nergac ::

FreeBSD + Openbox je ideal ...

Mogoče čez nekaj let, nikoli ne reci nikoli.

poweroff ::

Invictus je izjavil:

Ja, je, ampak to je za uporabnike... načeloma to niso strežniki.

Tale lista je precej dobra... Uporabiš, kar misliš, da je pametno...

https://www.cyberciti.biz/tips/linux-se...


Zelo dober seznam, ja. Edino malo zastarel je, točka 16 (Disable Unwanted Linux Services) se danes preverja malo drugače. Če imaš Upstart, potem rečeš
sudo initctl list
, System V (ta je danes kar privzeti) pa
sudo service --status-all
ter recimo
sudo systemctl list-unit-files --type=service


Onemogočanje USB/firewire/thunderbolt naprav se mi zdi tak nice touch, ampak jaz raje uporabljam USBGuard.

Mimogrede, noowner datoteke so na desktopu po navadi... tadaaaa: Adobe Acrobat Reader. Yup, that crap.
sudo poweroff


Vredno ogleda ...

TemaSporočilaOglediZadnje sporočilo
TemaSporočilaOglediZadnje sporočilo
!

[(K)Ubuntu] Vprašanja in težave (strani: 1 2 3 419 20 21 22 )

Oddelek: Operacijski sistemi
1067320427 (3806) polozweii
»

Izguba administratorskih pravic kot sudo uporabnik (strani: 1 2 )

Oddelek: Pomoč in nasveti
6511251 (9198) SeMiNeSanja
»

problem pri sprembi root gesla v MySQL v Ubuntu

Oddelek: Pomoč in nasveti
231220 (800) killa bee
»

AppArmor in Skype na Ubuntu

Oddelek: Programska oprema
51191 (1067) poweroff
»

Update SVN preko Apache (PHP)

Oddelek: Operacijski sistemi
5960 (902) Karlos

Več podobnih tem