Vulnerability Name:

CVE-2004-1051 (CCN-18055)

Assigned:2004-11-12
Published:2004-11-12
Updated:2017-07-11
Summary:sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Fri Nov 12 2004 - 10:52:06 CST
Sudo version 1.6.8p2 now available (fwd)

Source: MITRE
Type: CNA
CVE-2004-1051

Source: APPLE
Type: UNKNOWN
APPLE-SA-2005-05-03

Source: BUGTRAQ
Type: UNKNOWN
20041112 Sudo version 1.6.8p2 now available (fwd)

Source: OPENPKG
Type: UNKNOWN
OpenPKG-SA-2005.002

Source: CCN
Type: CIAC Information Bulletin P-042
Sudo Missing Input Santising

Source: DEBIAN
Type: UNKNOWN
DSA-596

Source: DEBIAN
Type: DSA-596
sudo -- missing input sanitising

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2004:133

Source: CCN
Type: OpenPKG-SA-2005.002
sudo

Source: CCN
Type: OSVDB ID: 11716
sudo Bash Script Subversion Arbitrary Command Execution

Source: BID
Type: Patch, Vendor Advisory
11668

Source: CCN
Type: BID-11668
GratiSoft Sudo Restricted Command Execution Bypass Vulnerability

Source: CCN
Type: Sudo Security Alert November 11, 2004
Bash scripts run via Sudo can be subverted

Source: CONFIRM
Type: UNKNOWN
http://www.sudo.ws/sudo/alerts/bash_functions.html

Source: CCN
Type: Trustix Secure Linux Security Advisory #2004-0058
Various security fixes

Source: CCN
Type: Trustix Secure Linux Security Advisory #2004-0061
Multiple vulnerabilities

Source: TRUSTIX
Type: UNKNOWN
2004-0061

Source: CCN
Type: TLSA-2005-17
Environment variable sanitization bug permits root compromise

Source: CCN
Type: USN-28-1
sudo vulnerability

Source: XF
Type: UNKNOWN
sudo-bash-command-execution(18055)

Source: XF
Type: UNKNOWN
sudo-bash-command-execution(18055)

Source: UBUNTU
Type: UNKNOWN
USN-28-1

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:arm:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:mips:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*
  • OR cpe:/o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:596
    V
    missing input sanitising
    2004-11-24
    BACK
    mandrakesoft mandrake multi network firewall 8.2
    todd_miller sudo 1.5.6
    todd_miller sudo 1.5.7
    todd_miller sudo 1.5.8
    todd_miller sudo 1.5.9
    todd_miller sudo 1.6
    todd_miller sudo 1.6.1
    todd_miller sudo 1.6.2
    todd_miller sudo 1.6.3
    todd_miller sudo 1.6.3_p1
    todd_miller sudo 1.6.3_p2
    todd_miller sudo 1.6.3_p3
    todd_miller sudo 1.6.3_p4
    todd_miller sudo 1.6.3_p5
    todd_miller sudo 1.6.3_p6
    todd_miller sudo 1.6.3_p7
    todd_miller sudo 1.6.4
    todd_miller sudo 1.6.4_p1
    todd_miller sudo 1.6.4_p2
    todd_miller sudo 1.6.5
    todd_miller sudo 1.6.5_p1
    todd_miller sudo 1.6.5_p2
    todd_miller sudo 1.6.6
    todd_miller sudo 1.6.7
    todd_miller sudo 1.6.8
    todd_miller sudo 1.6.8_p1
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    debian debian linux 3.0
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 9.2
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux 10.0
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux corporate server 2.1
    trustix secure linux 1.5
    trustix secure linux 2.0
    trustix secure linux 2.1
    trustix secure linux 2.2
    ubuntu ubuntu linux 4.1
    ubuntu ubuntu linux 4.1