3.7
CVSSv2

CVE-2005-1993

Published: 20/06/2005 Updated: 19/10/2018
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 329
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.5.8

todd miller sudo 1.5.9

todd miller sudo 1.6.3_p3

todd miller sudo 1.6.3_p4

todd miller sudo 1.6.5

todd miller sudo 1.6.5_p1

todd miller sudo 1.6.8_p8

todd miller sudo 1.3.1

todd miller sudo 1.6.2

todd miller sudo 1.6.3

todd miller sudo 1.6.3_p7

todd miller sudo 1.6.4

todd miller sudo 1.6.7_p5

todd miller sudo 1.6.8

todd miller sudo 1.5.6

todd miller sudo 1.5.7

todd miller sudo 1.6.3_p1

todd miller sudo 1.6.3_p2

todd miller sudo 1.6.4_p1

todd miller sudo 1.6.4_p2

todd miller sudo 1.6.8_p1

todd miller sudo 1.6.8_p7

todd miller sudo 1.6

todd miller sudo 1.6.1

todd miller sudo 1.6.3_p5

todd miller sudo 1.6.3_p6

todd miller sudo 1.6.5_p2

todd miller sudo 1.6.6

todd miller sudo 1.6.7

Vendor Advisories

Synopsis sudo security update Type/Severity Security Advisory: Moderate Topic An updated sudo package is available that fixes a race condition in sudo'spathname validationThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The sud ...
Charles Morris discovered a race condition in sudo which could lead to privilege escalation If /etc/sudoers allowed a user the execution of selected programs, and this was followed by another line containing the pseudo-command “ALL”, that user could execute arbitrary commands with sudo by creating symbolic links at a certain time ...