6.2
CVSSv2

CVE-2007-4305

Published: 13/08/2007 Updated: 05/09/2008
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 625
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing.

Vulnerable Product Search on Vulmon Subscribe to Product

todd_miller sudo 1.5.7

todd_miller sudo 1.5.9

todd_miller sudo 1.6.1

todd_miller sudo 1.6.3_p3

todd_miller sudo 1.6.3_p5

todd_miller sudo 1.6.3p5

todd_miller sudo 1.6.3p7

todd_miller sudo 1.6.4p2

todd_miller sudo 1.6.5_p1

todd_miller sudo 1.6.5p1

todd_miller sudo 1.6.8

todd_miller sudo 1.6.8_p12

sysjail sysjail

systrace systrace

todd_miller sudo 1.5.6

todd_miller sudo 1.6.3_p7

todd_miller sudo 1.6.3p1

todd_miller sudo 1.6.3p2

todd_miller sudo 1.6.3p3

todd_miller sudo 1.6.5p2

todd_miller sudo 1.6.6

todd_miller sudo 1.6.7

todd_miller sudo 1.6.7_p5

todd_miller sudo 1.6.2

todd_miller sudo 1.6.3

todd_miller sudo 1.6.3_p1

todd_miller sudo 1.6.3_p2

todd_miller sudo 1.6.4

todd_miller sudo 1.6.4_p1

todd_miller sudo 1.6.4_p2

todd_miller sudo 1.6.4p1

todd_miller sudo 1.6.8_p5

todd_miller sudo 1.6.8_p7

todd_miller sudo 1.6.8_p8

todd_miller sudo 1.6.8_p9

todd_miller sudo 1.5.8

todd_miller sudo 1.6

todd_miller sudo 1.6.3_p4

todd_miller sudo 1.6.3_p6

todd_miller sudo 1.6.3p4

todd_miller sudo 1.6.3p6

todd_miller sudo 1.6.5

todd_miller sudo 1.6.5_p2

todd_miller sudo 1.6.8_p1

todd_miller sudo 1.6.8_p2

Exploits

source: wwwsecurityfocuscom/bid/25258/info Systrace is prone to multiple concurrency vulnerabilities due to its implementation of system call wrappers This problem can result in a race condition between a user thread and the kernel Attackers can exploit these issues by replacing certain values in system call wrappers with malicious dat ...