Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-4158

Опубликовано: 11 нояб. 2004
Источник: redhat
EPSS Низкий

Описание

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.

Отчет

We do not consider this to be a security issue. https://bugzilla.redhat.com/show_bug.cgi?id=139478#c1

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=139478CVE-2004-1051 bash scripts run via Sudo can be subverted (CVE-2005-4158, CVE-2006-0151)

EPSS

Процентиль: 65%
0.00505
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.

nvd
больше 19 лет назад

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.

debian
больше 19 лет назад

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear ...

github
больше 3 лет назад

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.

EPSS

Процентиль: 65%
0.00505
Низкий