Vulnerability Name:

CVE-2005-1993 (CCN-21080)

Assigned:2005-06-20
Published:2005-06-20
Updated:2018-10-19
Summary:Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.
CVSS v3 Severity:4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
3.7 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2005-1993

Source: CCN
Type: Conectiva Linux Announcement CLSA-2005:976
Sudo - Local vulnerability

Source: APPLE
Type: UNKNOWN
APPLE-SA-2005-11-29

Source: CCN
Type: RHSA-2005-535
sudo security update

Source: CCN
Type: SA15744
Sudo Arbitrary Command Execution Vulnerability

Source: SECUNIA
Type: UNKNOWN
15744

Source: CCN
Type: SA17813
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
17813

Source: DEBIAN
Type: UNKNOWN
DSA-735

Source: DEBIAN
Type: DSA-735
sudo -- pathname validation race

Source: CCN
Type: GLSA-200506-22
sudo: Arbitrary command execution

Source: SUSE
Type: UNKNOWN
SUSE-SA:2005:036

Source: CCN
Type: OpenPKG-SA-2005.012
sudo

Source: OSVDB
Type: UNKNOWN
17396

Source: CCN
Type: OSVDB ID: 17396
Sudo sudoers ALL Entry Race Condition

Source: REDHAT
Type: UNKNOWN
RHSA-2005:535

Source: BUGTRAQ
Type: Patch, Vendor Advisory
20050620 Sudo version 1.6.8p9 now available, fixes security issue.

Source: FEDORA
Type: UNKNOWN
FLSA:162750

Source: BID
Type: UNKNOWN
13993

Source: CCN
Type: BID-13993
Todd Miller Sudo Local Race Condition Vulnerability

Source: BID
Type: UNKNOWN
15647

Source: CCN
Type: BID-15647
RETIRED: Apple Mac OS X Security Update 2005-009 Multiple Vulnerabilities

Source: CCN
Type: Sudo Web site
Race condition in Sudo's pathname validation

Source: CONFIRM
Type: UNKNOWN
http://www.sudo.ws/sudo/alerts/path_race.html

Source: CCN
Type: Sudo Download Web page
Downloading Sudo

Source: CCN
Type: TLSA-2005-73
Symlink attack in sudo

Source: CCN
Type: USN-142-1
sudo vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2005-0821

Source: VUPEN
Type: UNKNOWN
ADV-2005-2659

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=161116

Source: XF
Type: UNKNOWN
sudo-pathname-race-condition(21080)

Source: XF
Type: UNKNOWN
sudo-pathname-race-condition(21080)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11341

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:1242

Source: SUSE
Type: SUSE-SA:2005:036
sudo: race condition arbitrary code execution

Vulnerable Configuration:Configuration 1:
  • cpe:/a:todd_miller:sudo:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.8:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.5.9:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8_p7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8_p8:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20051993
    V
    CVE-2005-1993
    2015-11-16
    oval:org.mitre.oval:def:11341
    V
    Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.
    2013-04-29
    oval:org.mitre.oval:def:1242
    V
    sudo Symlink Vulnerability
    2005-09-21
    oval:org.debian:def:735
    V
    pathname validation race
    2005-07-01
    oval:com.redhat.rhsa:def:20050535
    P
    RHSA-2005:535: sudo security update (Moderate)
    2005-06-29
    BACK
    todd_miller sudo 1.3.1
    todd_miller sudo 1.5.6
    todd_miller sudo 1.5.7
    todd_miller sudo 1.5.8
    todd_miller sudo 1.5.9
    todd_miller sudo 1.6
    todd_miller sudo 1.6.1
    todd_miller sudo 1.6.2
    todd_miller sudo 1.6.3
    todd_miller sudo 1.6.3_p1
    todd_miller sudo 1.6.3_p2
    todd_miller sudo 1.6.3_p3
    todd_miller sudo 1.6.3_p4
    todd_miller sudo 1.6.3_p5
    todd_miller sudo 1.6.3_p6
    todd_miller sudo 1.6.3_p7
    todd_miller sudo 1.6.4
    todd_miller sudo 1.6.4_p1
    todd_miller sudo 1.6.4_p2
    todd_miller sudo 1.6.5
    todd_miller sudo 1.6.5_p1
    todd_miller sudo 1.6.5_p2
    todd_miller sudo 1.6.6
    todd_miller sudo 1.6.7
    todd_miller sudo 1.6.7_p5
    todd_miller sudo 1.6.8
    todd_miller sudo 1.6.8_p1
    todd_miller sudo 1.6.8_p7
    todd_miller sudo 1.6.8_p8