Vulnerability Name: | CVE-2005-1831 | ||||||||
Assigned: | 2005-05-31 | ||||||||
Published: | 2005-05-31 | ||||||||
Updated: | 2016-10-18 | ||||||||
Summary: | ** DISPUTED ** Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. Note: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catches SIGINT and returns an empty string for the password so I don't see how this could happen unless the user's actual password was empty." | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | ALLOWS_ADMIN_ACCESS | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20050531 Re: [securitysuse.de] [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3 Source: BUGTRAQ Type: UNKNOWN 20050531 RE: [securitysuse.de] [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3 Source: MITRE Type: CNA CVE-2005-1831 Source: BUGTRAQ Type: UNKNOWN 20050531 [XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3 Source: OSVDB Type: UNKNOWN 20417 | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
BACK |