Vulnerability Name:

CVE-2005-2959 (CCN-22865)

Assigned:2005-10-25
Published:2005-10-25
Updated:2018-10-03
Summary:Incomplete blacklist vulnerability in sudo 1.6.8 and earlier allows local users to gain privileges via the (1) SHELLOPTS and (2) PS4 environment variables before executing a bash script on behalf of another user, which are not cleared even though other variables are.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
3.4 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Full-Disclosure Mailing List, Tue Oct 25 2005 - 04:39:08 CDT
New sudo packages fix arbitrary command execution

Source: MITRE
Type: CNA
CVE-2005-2959

Source: CCN
Type: Mac OS X 10.4.9 and Security Update 2007-003
About the security content of Mac OS X 10.4.9 and Security Update 2007-003

Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=305214

Source: APPLE
Type: UNKNOWN
APPLE-SA-2007-03-13

Source: CCN
Type: SA17318
Sudo Environment Cleaning Privilege Escalation Vulnerability

Source: SECUNIA
Type: Vendor Advisory
17318

Source: SECUNIA
Type: Vendor Advisory
17322

Source: SECUNIA
Type: Vendor Advisory
17345

Source: SECUNIA
Type: Patch, Vendor Advisory
17390

Source: SECUNIA
Type: Vendor Advisory
17666

Source: SECUNIA
Type: Vendor Advisory
18549

Source: CCN
Type: SA24479
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
24479

Source: CCN
Type: Apple Mac OS X Web site
Apple - Apple - Mac OS X - Leopard Sneak Peek

Source: DEBIAN
Type: Patch, Vendor Advisory
DSA-870

Source: DEBIAN
Type: DSA-870
sudo -- missing input sanitising

Source: MANDRIVA
Type: UNKNOWN
MDKSA-2005:201

Source: SUSE
Type: UNKNOWN
SUSE-SR:2006:002

Source: CCN
Type: OpenPKG-SA-2006.002
sudo

Source: OPENPKG
Type: UNKNOWN
OpenPKG-SA-2006.002

Source: CCN
Type: OSVDB ID: 20303
Sudo Environment Variable Manipulation Local Privilege Escalation

Source: SUSE
Type: Vendor Advisory
SUSE-SR:2005:025

Source: BID
Type: Exploit
15191

Source: CCN
Type: BID-15191
Todd Miller Sudo Local Privilege Escalation Vulnerability

Source: CONFIRM
Type: UNKNOWN
http://www.sudo.ws/bugs/show_bug.cgi?id=182

Source: CCN
Type: Sudo Web site
Race condition in Sudo's pathname validation

Source: CCN
Type: USN-213-1
sudo vulnerability

Source: CERT
Type: US Government Resource
TA07-072A

Source: VUPEN
Type: Vendor Advisory
ADV-2007-0930

Source: XF
Type: UNKNOWN
debian-sudo-shellopts-ps4-command-execute(22865)

Source: UBUNTU
Type: UNKNOWN
USN-213-1

Source: SUSE
Type: SUSE-SR:2005:025
SUSE Security Summary Report

Source: SUSE
Type: SUSE-SR:2006:002
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:todd_miller:sudo:1.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3_p7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p3:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.3p7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.4p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5_p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5_p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5p1:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.5p2:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.6:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.7:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.7_p5:*:*:*:*:*:*:*
  • OR cpe:/a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • AND
  • cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.debian:def:870
    V
    missing input sanitising
    2005-10-25
    BACK
    todd_miller sudo 1.6
    todd_miller sudo 1.6.1
    todd_miller sudo 1.6.2
    todd_miller sudo 1.6.3
    todd_miller sudo 1.6.3_p1
    todd_miller sudo 1.6.3_p2
    todd_miller sudo 1.6.3_p3
    todd_miller sudo 1.6.3_p4
    todd_miller sudo 1.6.3_p5
    todd_miller sudo 1.6.3_p6
    todd_miller sudo 1.6.3_p7
    todd_miller sudo 1.6.3p1
    todd_miller sudo 1.6.3p2
    todd_miller sudo 1.6.3p3
    todd_miller sudo 1.6.3p4
    todd_miller sudo 1.6.3p5
    todd_miller sudo 1.6.3p6
    todd_miller sudo 1.6.3p7
    todd_miller sudo 1.6.4
    todd_miller sudo 1.6.4_p1
    todd_miller sudo 1.6.4_p2
    todd_miller sudo 1.6.4p1
    todd_miller sudo 1.6.4p2
    todd_miller sudo 1.6.5
    todd_miller sudo 1.6.5_p1
    todd_miller sudo 1.6.5_p2
    todd_miller sudo 1.6.5p1
    todd_miller sudo 1.6.5p2
    todd_miller sudo 1.6.6
    todd_miller sudo 1.6.7
    todd_miller sudo 1.6.7_p5
    todd_miller sudo 1.6.8
    debian debian linux 3.0
    debian debian linux 3.1
    openpkg openpkg current
    mandrakesoft mandrake linux corporate server 2.1
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake multi network firewall 2.0
    mandrakesoft mandrake linux 2006
    openpkg openpkg 2.5
    mandrakesoft mandrake linux 10.1
    mandrakesoft mandrake linux 2006
    mandrakesoft mandrake linux corporate server 3.0
    mandrakesoft mandrake linux corporate server 2.1