First published: Sun Dec 11 2005(Updated: )
Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sudo | =1.5.6 | |
Sudo | =1.5.7 | |
Sudo | =1.5.8 | |
Sudo | =1.5.9 | |
Sudo | =1.6 | |
Sudo | =1.6.1 | |
Sudo | =1.6.2 | |
Sudo | =1.6.3 | |
Sudo | =1.6.3_p1 | |
Sudo | =1.6.3_p2 | |
Sudo | =1.6.3_p3 | |
Sudo | =1.6.3_p4 | |
Sudo | =1.6.3_p5 | |
Sudo | =1.6.3_p6 | |
Sudo | =1.6.3_p7 | |
Sudo | =1.6.4 | |
Sudo | =1.6.4_p1 | |
Sudo | =1.6.4_p2 | |
Sudo | =1.6.5 | |
Sudo | =1.6.5_p1 | |
Sudo | =1.6.5_p2 | |
Sudo | =1.6.6 | |
Sudo | =1.6.7 | |
Sudo | =1.6.7_p5 | |
Sudo | =1.6.8 | |
Sudo | =1.6.8_p1 | |
Sudo | =1.6.8_p5 | |
Sudo | =1.6.8_p7 | |
Sudo | =1.6.8_p8 | |
Sudo | =1.6.8_p9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4158 has a moderate severity level as it allows limited local users to execute arbitrary Perl library files.
To fix CVE-2005-4158, upgrade to Sudo version 1.6.8 or later where the vulnerability is addressed.
CVE-2005-4158 affects Sudo versions prior to 1.6.8 including 1.5.8, 1.5.9, and several 1.6.x versions.
The implications of CVE-2005-4158 include the potential for unauthorized code execution by local users, which could lead to further system compromise.
CVE-2005-4158 was discovered through analysis of the Sudo environment variable handling, particularly the handling of the Perl taint flag.