First published: Mon Jul 26 2004(Updated: )
Quoting first paragraph from [1]: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED RAWHIDE - Need to call setsid() when starting daemons to prevent TIOCSTI attacks" href="show_bug.cgi?id=173008">https://bugzilla.redhat.com/show_bug.cgi?id=173008</a> for issue description: ====================== When starting a program via "su - user -c program" the user session can escape to the parent session by using the TIOCSTI ioctl to push characters into the input buffer. This allows for example a non-root session to push "chmod 666 /etc/shadow" or similarly bad commands into the input buffer such that after the end of the session they are executed. References: [1] <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED RAWHIDE - Need to call setsid() when starting daemons to prevent TIOCSTI attacks" href="show_bug.cgi?id=173008">https://bugzilla.redhat.com/show_bug.cgi?id=173008</a> [2] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=628843</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/shadow | 1:4.8.1-1 1:4.13+dfsg1-1 1:4.15.3-2 1:4.16.0-4 | |
debian/sudo | 1.9.5p2-3+deb11u1 1.9.13p3-1+deb12u1 1.9.15p5-3 | |
Sudo | >=1.3.0<=1.7.4 | |
Shadow-utils | >=4.0.0<=4.1.5 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =4 | |
Red Hat Enterprise Linux | =5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4890 has a moderate severity rating due to its potential exploitation in TIOCSTI attacks.
To fix CVE-2005-4890, update affected packages such as shadow and sudo to the specified remedied versions.
CVE-2005-4890 affects various versions of the Debian 'shadow' and 'sudo' packages, as well as certain versions of Red Hat Enterprise Linux.
CVE-2005-4890 is a privilege escalation vulnerability associated with improper handling of signals.
While CVE-2005-4890 is older, systems running outdated versions of the affected software remain at risk and should be updated.