Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-4890

Опубликовано: 26 июл. 2004
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

Отчет

This issue affects the version of coreutils package, as shipped with Red Hat Enterprise Linux 4. Red Hat Enterprise Linux 4 is however in the Extended Life Cycle Support (ELS) phase. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4coreutilsWill not fix
Red Hat Enterprise Linux 5coreutilsNot affected
Red Hat Enterprise Linux 6coreutilsNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=710208coreutils: tty hijacking possible in "su" via TIOCSTI ioctl

EPSS

Процентиль: 38%
0.00163
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

CVSS3: 7.8
nvd
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

CVSS3: 7.8
debian
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo ...

CVSS3: 7.8
github
больше 3 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

EPSS

Процентиль: 38%
0.00163
Низкий

6.2 Medium

CVSS2