|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-1051: sudo is passing environment variables, which might lead to priv escalation | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Marcus Meissner <meissner> |
| Component: | Incidents | Assignee: | Ruediger Oertel <ro> |
| Status: | RESOLVED FIXED | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2004-1051: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Marcus Meissner
2004-11-15 18:25:47 UTC
<!-- SBZ_reproduce --> n/a also problematic: exported shell functions with names of common binaries. just for reference. ====================================================== Candidate: CAN-2004-1051 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1051 Reference: CONFIRM:http://www.sudo.ws/sudo/alerts/bash_functions.html Reference: BUGTRAQ:20041112 Sudo version 1.6.8p2 now available (fwd) Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110028877431192&w=2 sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that are executed instead of any program within the bash script that do not have full pathnames. Marian, do you need more informations to handle the bug? ... sorry. missed it's a stable-only fix. will fix for 9.3 it is 9.3 time ... rudi is working on it I think reassign to Rudi who is working on it. STABLE has 1.6.8p7 now, please reopen if any further action needed. CVE-2004-1051: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C) |