Tips for finding Knowledge Articles

  • - Enter just a few key words related to your question or problem
  • - Add Key words to refine your search as necessary
  • - Do not use punctuation
  • - Search is not case sensitive
  • - Avoid non-descriptive filler words like "how", "the", "what", etc.
  • - If you do not find what you are looking for the first time,reduce the number of key words you enter and try searching again.
  • - Minimum supported Internet Explorer version is IE9
Home  >
article

KB-8791: Is Centrify's DZDO command impacted by CVE-2017-1000367 (sudo privilege escalation)?

Centrify DirectControl ,  

3 June,17 at 12:18 AM

Applies to: Centrify Suite 2017 (5.3.0) Direct Authorize DZDO command on Linux only

Question:
Is Centrify's DZDO command impacted by CVE-2017-1000367 (sudo privilege escalation)?

A flaw was found in the way sudo versions 1.8.17p1 through 1.8.20p1 parse tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. 

This exposure is on Linux OS's only, the sudo permissions must be granted first so this vulnerability is NOT exposed to just anybody.

Answer:
A close inspection of the Centrify code has allowed us to determine that the Direct Authorize command "DZDO” which replaces sudo does not match the criteria required to be susceptible to this exploit therefore it is not impacted by this CVE.     

External References:

https://access.redhat.com/security/cve/cve-2017-1000367
https://access.redhat.com/security/vulnerabilities/3059071
https://www.sudo.ws/alerts/linux_tty.html

Centrify Corporation does not take any responsibility for the content or availability of this link and it was provided as a courtesy.  Customers should contact the vendor if there are any further questions

 

Still have questions? Click here to log a technical support case, or collaborate with your peers in Centrify's Online Community.