Hey,

I cannot reproduce your exploit.

Using the stock sudoers file only with the modification

%sudo ALL=(ALL) ALL

and the place for running X applications as root is commented out.

## Run X applications through sudo; HOME is used to find the
## .Xauthority file.  Note that other programs use HOME to find
## configuration files and this may lead to privilege escalation!
# Defaults env_keep += "HOME"

cheers,

Heiko

Am 03.02.2014 11:40, schrieb Martti Kühne:
Hey guys

I'll just throw my more local (than probably necessary) .bashrc
function in here...

sudo ()
{
     local env;
     if [[ -n "$DISPLAY" ]]; then
         command sudo "XAUTHORITY=$HOME/.Xauthority" "$@";
     else
         command sudo "$@";
     fi
}

You don't give up on X11 cookies, you don't need to touch pam and can
go on hoping it works in your favor, and thridly, there's even a
mention of .Xauthority in the stock sudoers file, so, you'll never
find where these things are set up on a running system anyway...

cheers!
mar77i

Reply via email to