Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 14 Jun 2017 09:59:26 -0700
From: Qualys Security Advisory <qsa@...lys.com>
To: oss-security@...ts.openwall.com
Subject: Re: Qualys Security Advisory - CVE-2017-1000367 in Sudo's
 get_process_ttyname() for Linux

Hi all,

Since a working exploit has been published already
(https://github.com/c0d3z3r0/sudo-CVE-2017-1000367), please find our
Sudoer-to-root exploit (Linux_sudo_CVE-2017-1000367.c) attached to this
mail. Thank you very much!

With best regards,

-- 
the Qualys Security Advisory team

View attachment "Linux_sudo_CVE-2017-1000367.c" of type "text/plain" (4705 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ