Lucene search

K
ubuntuUbuntuUSN-142-1
HistoryJun 21, 2005 - 12:00 a.m.

sudo vulnerability

2005-06-2100:00:00
ubuntu.com
31

6.9 Medium

AI Score

Confidence

Low

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

26.3%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

Charles Morris discovered a race condition in sudo which could lead to
privilege escalation. If /etc/sudoers allowed a user the execution of
selected programs, and this was followed by another line containing
the pseudo-command “ALL”, that user could execute arbitrary commands
with sudo by creating symbolic links at a certain time.

Please note that this does not affect a standard Ubuntu installation.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchsudo< *UNKNOWN
Ubuntu4.10noarchsudo< *UNKNOWN

6.9 Medium

AI Score

Confidence

Low

3.7 Low

CVSS2

Access Vector

LOCAL

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

0.001 Low

EPSS

Percentile

26.3%