Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2004-1051

Опубликовано: 01 мар. 2005
Источник: debian
EPSS Низкий

Описание

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sudofixed1.6.8p3-1package

EPSS

Процентиль: 30%
0.0011
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

redhat
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

nvd
больше 20 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

github
около 3 лет назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

EPSS

Процентиль: 30%
0.0011
Низкий