4.6
CVSSv2

CVE-2005-4158

Published: 11/12/2005 Updated: 20/07/2017
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 475
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Sudo prior to 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.

Vulnerable Product Search on Vulmon Subscribe to Product

todd miller sudo 1.5.6

todd miller sudo 1.5.7

todd miller sudo 1.6.3_p1

todd miller sudo 1.6.3_p2

todd miller sudo 1.6.3_p3

todd miller sudo 1.6.4_p2

todd miller sudo 1.6.5

todd miller sudo 1.6.8_p1

todd miller sudo 1.6.8_p5

todd miller sudo 1.6.2

todd miller sudo 1.6.3

todd miller sudo 1.6.4

todd miller sudo 1.6.4_p1

todd miller sudo 1.6.7_p5

todd miller sudo 1.6.8

todd miller sudo 1.6

todd miller sudo 1.6.1

todd miller sudo 1.6.3_p6

todd miller sudo 1.6.3_p7

todd miller sudo 1.6.6

todd miller sudo 1.6.7

todd miller sudo 1.6.8_p9

todd miller sudo 1.5.8

todd miller sudo 1.5.9

todd miller sudo 1.6.3_p4

todd miller sudo 1.6.3_p5

todd miller sudo 1.6.5_p1

todd miller sudo 1.6.5_p2

todd miller sudo 1.6.8_p7

todd miller sudo 1.6.8_p8

Vendor Advisories

Debian Bug report logs - #315115 [bugtraq] Sudo version 168p9 now available, fixes security issue Package: sudo; Maintainer for sudo is Bdale Garbee <bdale@gagcom>; Source for sudo is src:sudo (PTS, buildd, popcon) Reported by: Christian Hammers <ch@debianorg> Date: Mon, 20 Jun 2005 17:18:03 UTC Severity: criti ...
Debian Bug report logs - #342948 CVE-2005-4158: Insecure handling of PERLLIB PERL5LIB PERL5OPT environment vars Package: sudo; Maintainer for sudo is Bdale Garbee <bdale@gagcom>; Source for sudo is src:sudo (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Sun, 11 Dec 2005 21:48:02 UTC Se ...
Charles Morris discovered a privilege escalation vulnerability in sudo On executing Perl scripts with sudo, various environment variables that affect Perl’s library search path were not cleaned properly If sudo is set up to grant limited sudo execution of Perl scripts to normal users, this could be exploited to run arbitrary commands as the ta ...
USN-235-1 fixed a vulnerability in sudo’s handling of environment variables Tavis Ormandy noticed that sudo did not filter out the PYTHONINSPECT environment variable, so that users with the limited privilege of calling a python script with sudo could still escalate their privileges ...

Exploits

source: wwwsecurityfocuscom/bid/16184/info Sudo is prone to a security-bypass vulnerability that could lead to arbitrary code execution This issue is due to an error in the application when handling environment variables A local attacker with the ability to run Python scripts can exploit this vulnerability to gain access to an intera ...
source: wwwsecurityfocuscom/bid/15394/info Sudo is prone to a security-bypass vulnerability that could lead to arbitrary code execution This issue is due to an error in the application when handling the 'PERLLIB', 'PERL5LIB', and 'PERL5OPT' environment variables when tainting is ignored An attacker can exploit this vulnerability to byp ...
source: wwwsecurityfocuscom/bid/16184/info Sudo is prone to a security-bypass vulnerability that could lead to arbitrary code execution This issue is due to an error in the application when handling environment variables A local attacker with the ability to run Python scripts can exploit this vulnerability to gain access to an interact ...