Lucene search

K
freebsdFreeBSD1B725079-9EF6-11DA-B410-000E0C2E438A
HistoryOct 25, 2005 - 12:00 a.m.

sudo -- arbitrary command execution

2005-10-2500:00:00
vuxml.freebsd.org
15

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

9.5%

Tavis Ormandy reports:

The bash shell uses the value of the PS4 environment
variable (after expansion) as a prefix for commands run
in execution trace mode. Execution trace mode (xtrace) is
normally set via bash’s -x command line option or
interactively by running “set -o xtrace”. However, it may
also be enabled by placing the string “xtrace” in the
SHELLOPTS environment variable before bash is started.
A malicious user with sudo access to a shell script that
uses bash can use this feature to run arbitrary commands
for each line of the script.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchsudo< 1.6.8.10UNKNOWN

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

EPSS

0

Percentile

9.5%