3.7
CVSSv2

CVE-2005-1993

Published: 20/06/2005 Updated: 19/10/2018
CVSS v2 Base Score: 3.7 | Impact Score: 6.4 | Exploitability Score: 1.9
VMScore: 329
Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Race condition in sudo 1.3.1 up to 1.6.8p8, when the ALL pseudo-command is used after a user entry in the sudoers file, allows local users to gain privileges via a symlink attack.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.5.8

todd miller sudo 1.6.3 p6

todd miller sudo 1.3.1

todd miller sudo 1.5.9

todd miller sudo 1.6.6

todd miller sudo 1.6.8 p7

todd miller sudo 1.6.3

todd miller sudo 1.6.4 p2

todd miller sudo 1.6.1

todd miller sudo 1.6.3 p5

todd miller sudo 1.5.7

todd miller sudo 1.6.2

todd miller sudo 1.6.8

todd miller sudo 1.6.4 p1

todd miller sudo 1.6.3 p2

todd miller sudo 1.6.3 p4

todd miller sudo 1.6.5 p2

todd miller sudo 1.6.5

todd miller sudo 1.6.3 p3

todd miller sudo 1.6.8 p1

todd miller sudo 1.6.5 p1

todd miller sudo 1.6.3 p7

todd miller sudo 1.6

todd miller sudo 1.6.4

todd miller sudo 1.6.7

todd miller sudo 1.6.8 p8

todd miller sudo 1.6.3 p1

todd miller sudo 1.5.6

todd miller sudo 1.6.7 p5

Vendor Advisories

Synopsis sudo security update Type/Severity Security Advisory: Moderate Topic An updated sudo package is available that fixes a race condition in sudo'spathname validationThis update has been rated as having moderate security impact by the RedHat Security Response Team Description The sud ...
Charles Morris discovered a race condition in sudo which could lead to privilege escalation If /etc/sudoers allowed a user the execution of selected programs, and this was followed by another line containing the pseudo-command “ALL”, that user could execute arbitrary commands with sudo by creating symbolic links at a certain time ...