First published: Mon Aug 13 2007(Updated: )
Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | ||
OpenBSD | ||
Sysjail | ||
Systrace | ||
Sudo | =1.5.6 | |
Sudo | =1.5.7 | |
Sudo | =1.5.8 | |
Sudo | =1.5.9 | |
Sudo | =1.6 | |
Sudo | =1.6.1 | |
Sudo | =1.6.2 | |
Sudo | =1.6.3 | |
Sudo | =1.6.3_p1 | |
Sudo | =1.6.3_p2 | |
Sudo | =1.6.3_p3 | |
Sudo | =1.6.3_p4 | |
Sudo | =1.6.3_p5 | |
Sudo | =1.6.3_p6 | |
Sudo | =1.6.3_p7 | |
Sudo | =1.6.3p1 | |
Sudo | =1.6.3p2 | |
Sudo | =1.6.3p3 | |
Sudo | =1.6.3p4 | |
Sudo | =1.6.3p5 | |
Sudo | =1.6.3p6 | |
Sudo | =1.6.3p7 | |
Sudo | =1.6.4 | |
Sudo | =1.6.4_p1 | |
Sudo | =1.6.4_p2 | |
Sudo | =1.6.4p1 | |
Sudo | =1.6.4p2 | |
Sudo | =1.6.5 | |
Sudo | =1.6.5_p1 | |
Sudo | =1.6.5_p2 | |
Sudo | =1.6.5p1 | |
Sudo | =1.6.5p2 | |
Sudo | =1.6.6 | |
Sudo | =1.6.7 | |
Sudo | =1.6.7_p5 | |
Sudo | =1.6.8 | |
Sudo | =1.6.8_p1 | |
Sudo | =1.6.8_p2 | |
Sudo | =1.6.8_p5 | |
Sudo | =1.6.8_p7 | |
Sudo | =1.6.8_p8 | |
Sudo | =1.6.8_p9 | |
Sudo | =1.6.8_p12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4305 is considered a high severity vulnerability due to its ability to allow local users to bypass access control policies.
To fix CVE-2007-4305, it is recommended to upgrade to the latest versions of Sudo and Systrace that address the race condition vulnerabilities.
CVE-2007-4305 affects Sudo versions 1.5.6 to 1.6.8, with various updates required to mitigate the issue.
CVE-2007-4305 is specifically a vulnerability on NetBSD and OpenBSD systems using Sudo and Systrace.
The impacts of CVE-2007-4305 include unauthorized access and manipulation of system calls, compromising access control and auditing.