Bugzilla – Bug 63233
VUL-0: CVE-2004-1051: sudo is passing environment variables, which might lead to priv escalation
Last modified: 2021-10-16 09:13:17 UTC
sudo in its current configuration passes several environment variables down to the root process, which might be used to get a unwanted privilege escalation. especially the environment variables "IFS" and "PATH" are merged over to the called process/script. with specially set paths or ifs a user privileged to only run script "foo" could run other scripts as root. This is more of a design issue within sudo and known for some time, so I am not sure whether we should really change this via a security update. However, please change to this behaviour in STABLE.
<!-- SBZ_reproduce --> n/a
also problematic: exported shell functions with names of common binaries.
just for reference. ====================================================== Candidate: CAN-2004-1051 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1051 Reference: CONFIRM:http://www.sudo.ws/sudo/alerts/bash_functions.html Reference: BUGTRAQ:20041112 Sudo version 1.6.8p2 now available (fwd) Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110028877431192&w=2 sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that are executed instead of any program within the bash script that do not have full pathnames.
Marian, do you need more informations to handle the bug?
... sorry. missed it's a stable-only fix.
will fix for 9.3
it is 9.3 time ... rudi is working on it I think
reassign to Rudi who is working on it.
STABLE has 1.6.8p7 now, please reopen if any further action needed.
CVE-2004-1051: CVSS v2 Base Score: 7.2 (AV:L/AC:L/Au:N/C:C/I:C/A:C)