First published: Thu Nov 18 2004(Updated: )
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Todd Miller Sudo | =1.5.8 | |
Todd Miller Sudo | =1.6.3_p6 | |
Todd Miller Sudo | =1.5.9 | |
Todd Miller Sudo | =1.6.6 | |
Todd Miller Sudo | =1.6.3 | |
Todd Miller Sudo | =1.6.4_p2 | |
Todd Miller Sudo | =1.6.1 | |
Todd Miller Sudo | =1.6.3_p5 | |
Todd Miller Sudo | =1.5.7 | |
Todd Miller Sudo | =1.6.2 | |
Todd Miller Sudo | =1.6.8 | |
Todd Miller Sudo | =1.6.4_p1 | |
Todd Miller Sudo | =1.6.3_p2 | |
Todd Miller Sudo | =1.6.3_p4 | |
Todd Miller Sudo | =1.6.5_p2 | |
Todd Miller Sudo | =1.6.5 | |
Todd Miller Sudo | =1.6.3_p3 | |
Todd Miller Sudo | =1.6.8_p1 | |
Todd Miller Sudo | =1.6.5_p1 | |
Todd Miller Sudo | =1.6.3_p7 | |
Todd Miller Sudo | =1.6 | |
Todd Miller Sudo | =1.6.4 | |
Mandrakesoft Mandrake Multi Network Firewall | =8.2 | |
Todd Miller Sudo | =1.6.7 | |
Todd Miller Sudo | =1.6.3_p1 | |
Todd Miller Sudo | =1.5.6 | |
Trustix Secure Linux | =2.0 | |
Mandriva Linux Corporate Server | =2.1 | |
Debian GNU/Linux | =3.0 | |
Ubuntu Linux | =4.1 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Mandrake Linux | =9.2 | |
Debian GNU/Linux | =3.0 | |
Mandrake Linux | =10.1 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Mandrake Linux | =9.2 | |
Trustix Secure Linux | =1.5 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Debian GNU/Linux | =3.0 | |
Mandrake Linux | =10.0 | |
Trustix Secure Linux | =2.1 | |
Trustix Secure Linux | =2.2 | |
Ubuntu Linux | =4.1 | |
Debian GNU/Linux | =3.0 | |
Mandriva Linux Corporate Server | =2.1 | |
Mandrake Linux | =10.0 | |
Mandrake Linux | =10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1051 is classified as a high severity vulnerability due to its potential for local users to execute arbitrary commands.
To fix CVE-2004-1051, upgrade to a version of sudo that is 1.6.8p2 or later.
CVE-2004-1051 affects sudo versions prior to 1.6.8p2, including 1.5.6, 1.5.7, 1.5.8, and several 1.6.x versions.
CVE-2004-1051 allows command execution through the misuse of "()" style environment variables to create functions that can override existing commands.
Local users on systems running vulnerable versions of sudo are impacted by CVE-2004-1051.