Lucene search

K
ubuntuUbuntuUSN-142-1
HistoryJun 21, 2005 - 12:00 a.m.

sudo vulnerability

2005-06-2100:00:00
ubuntu.com
32

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

27.0%

Releases

  • Ubuntu 5.04
  • Ubuntu 4.10

Details

Charles Morris discovered a race condition in sudo which could lead to
privilege escalation. If /etc/sudoers allowed a user the execution of
selected programs, and this was followed by another line containing
the pseudo-command “ALL”, that user could execute arbitrary commands
with sudo by creating symbolic links at a certain time.

Please note that this does not affect a standard Ubuntu installation.

OSVersionArchitecturePackageVersionFilename
Ubuntu5.04noarchsudo< *UNKNOWN
Ubuntu4.10noarchsudo< *UNKNOWN

CVSS2

3.7

Attack Vector

LOCAL

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:H/Au:N/C:P/I:P/A:P

AI Score

6.9

Confidence

Low

EPSS

0.001

Percentile

27.0%