6.2
CVSSv2

CVE-2007-4305

Published: 13/08/2007 Updated: 05/09/2008
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 625
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing.

Vulnerable Product Search on Vulmon Subscribe to Product

sysjail sysjail

systrace systrace

todd miller sudo 1.5.6

todd miller sudo 1.5.7

todd miller sudo 1.5.8

todd miller sudo 1.5.9

todd miller sudo 1.6

todd miller sudo 1.6.1

todd miller sudo 1.6.2

todd miller sudo 1.6.3

todd miller sudo 1.6.3 p1

todd miller sudo 1.6.3 p2

todd miller sudo 1.6.3 p3

todd miller sudo 1.6.3 p4

todd miller sudo 1.6.3 p5

todd miller sudo 1.6.3 p6

todd miller sudo 1.6.3 p7

todd miller sudo 1.6.3p1

todd miller sudo 1.6.3p2

todd miller sudo 1.6.3p3

todd miller sudo 1.6.3p4

todd miller sudo 1.6.3p5

todd miller sudo 1.6.3p6

todd miller sudo 1.6.3p7

todd miller sudo 1.6.4

todd miller sudo 1.6.4 p1

todd miller sudo 1.6.4 p2

todd miller sudo 1.6.4p1

todd miller sudo 1.6.4p2

todd miller sudo 1.6.5

todd miller sudo 1.6.5 p1

todd miller sudo 1.6.5 p2

todd miller sudo 1.6.5p1

todd miller sudo 1.6.5p2

todd miller sudo 1.6.6

todd miller sudo 1.6.7

todd miller sudo 1.6.7 p5

todd miller sudo 1.6.8

todd miller sudo 1.6.8 p1

todd miller sudo 1.6.8 p2

todd miller sudo 1.6.8 p5

todd miller sudo 1.6.8 p7

todd miller sudo 1.6.8 p8

todd miller sudo 1.6.8 p9

todd miller sudo 1.6.8 p12

Exploits

source: wwwsecurityfocuscom/bid/25258/info Systrace is prone to multiple concurrency vulnerabilities due to its implementation of system call wrappers This problem can result in a race condition between a user thread and the kernel Attackers can exploit these issues by replacing certain values in system call wrappers with malicious dat ...