CVE-2005-4158

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.
References
Link Resource
http://secunia.com/advisories/17534/ Patch Vendor Advisory
http://secunia.com/advisories/18102
http://secunia.com/advisories/18156
http://secunia.com/advisories/18308
http://secunia.com/advisories/18463
http://secunia.com/advisories/18549
http://secunia.com/advisories/18558
http://secunia.com/advisories/21692
http://securitytracker.com/alerts/2005/Nov/1015192.html Patch
http://www.debian.org/security/2006/dsa-946
http://www.mandriva.com/security/advisories?name=MDKSA-2005:234
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
http://www.novell.com/linux/security/advisories/2006_02_sr.html
http://www.securityfocus.com/bid/15394 Exploit Patch
http://www.sudo.ws/sudo/alerts/perl_env.html Patch Vendor Advisory
http://www.trustix.org/errata/2006/0002/
http://www.vupen.com/english/advisories/2005/2386
https://exchange.xforce.ibmcloud.com/vulnerabilities/23102
https://www.ubuntu.com/usn/usn-235-1/
http://secunia.com/advisories/17534/ Patch Vendor Advisory
http://secunia.com/advisories/18102
http://secunia.com/advisories/18156
http://secunia.com/advisories/18308
http://secunia.com/advisories/18463
http://secunia.com/advisories/18549
http://secunia.com/advisories/18558
http://secunia.com/advisories/21692
http://securitytracker.com/alerts/2005/Nov/1015192.html Patch
http://www.debian.org/security/2006/dsa-946
http://www.mandriva.com/security/advisories?name=MDKSA-2005:234
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
http://www.novell.com/linux/security/advisories/2006_02_sr.html
http://www.securityfocus.com/bid/15394 Exploit Patch
http://www.sudo.ws/sudo/alerts/perl_env.html Patch Vendor Advisory
http://www.trustix.org/errata/2006/0002/
http://www.vupen.com/english/advisories/2005/2386
https://exchange.xforce.ibmcloud.com/vulnerabilities/23102
https://www.ubuntu.com/usn/usn-235-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p5:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*
cpe:2.3:a:todd_miller:sudo:1.6.8_p9:*:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://secunia.com/advisories/17534/ - Patch, Vendor Advisory () http://secunia.com/advisories/17534/ - Patch, Vendor Advisory
References () http://secunia.com/advisories/18102 - () http://secunia.com/advisories/18102 -
References () http://secunia.com/advisories/18156 - () http://secunia.com/advisories/18156 -
References () http://secunia.com/advisories/18308 - () http://secunia.com/advisories/18308 -
References () http://secunia.com/advisories/18463 - () http://secunia.com/advisories/18463 -
References () http://secunia.com/advisories/18549 - () http://secunia.com/advisories/18549 -
References () http://secunia.com/advisories/18558 - () http://secunia.com/advisories/18558 -
References () http://secunia.com/advisories/21692 - () http://secunia.com/advisories/21692 -
References () http://securitytracker.com/alerts/2005/Nov/1015192.html - Patch () http://securitytracker.com/alerts/2005/Nov/1015192.html - Patch
References () http://www.debian.org/security/2006/dsa-946 - () http://www.debian.org/security/2006/dsa-946 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:234 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:234 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:159 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:159 -
References () http://www.novell.com/linux/security/advisories/2006_02_sr.html - () http://www.novell.com/linux/security/advisories/2006_02_sr.html -
References () http://www.securityfocus.com/bid/15394 - Exploit, Patch () http://www.securityfocus.com/bid/15394 - Exploit, Patch
References () http://www.sudo.ws/sudo/alerts/perl_env.html - Patch, Vendor Advisory () http://www.sudo.ws/sudo/alerts/perl_env.html - Patch, Vendor Advisory
References () http://www.trustix.org/errata/2006/0002/ - () http://www.trustix.org/errata/2006/0002/ -
References () http://www.vupen.com/english/advisories/2005/2386 - () http://www.vupen.com/english/advisories/2005/2386 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/23102 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/23102 -
References () https://www.ubuntu.com/usn/usn-235-1/ - () https://www.ubuntu.com/usn/usn-235-1/ -

Information

Published : 2005-12-11 02:03

Updated : 2024-11-21 00:03


NVD link : CVE-2005-4158

Mitre link : CVE-2005-4158

CVE.ORG link : CVE-2005-4158


JSON object : View

Products Affected

todd_miller

  • sudo