Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2004-1051

Опубликовано: 11 нояб. 2004
Источник: redhat
EPSS Низкий

Описание

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

Отчет

We do not consider this to be a security issue: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=139478CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)

EPSS

Процентиль: 50%
0.00274
Низкий

Связанные уязвимости

ubuntu
почти 21 год назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

nvd
почти 21 год назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

debian
почти 21 год назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands b ...

github
почти 4 года назад

sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.

EPSS

Процентиль: 50%
0.00274
Низкий