There is a possible tty hijacking in shadow 4.x prior to 4.1.5 and sudo 1.x prior to 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
debian shadow |
||
sudo project sudo |
||
debian debian linux 8.0 |
||
debian debian linux 9.0 |
||
debian debian linux 10.0 |
||
redhat enterprise linux 5 |
||
redhat enterprise linux 4 |
||
redhat enterprise linux 6.0 |