Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-4890

Опубликовано: 04 нояб. 2019
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.2
CVSS3: 7.8

Описание

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

РелизСтатусПримечание
artful

not-affected

bionic

not-affected

cosmic

not-affected

devel

not-affected

disco

not-affected

eoan

not-affected

esm-infra-legacy/trusty

not-affected

1:4.1.5.1-1ubuntu9
esm-infra/bionic

not-affected

esm-infra/focal

not-affected

esm-infra/xenial

not-affected

Показывать по

РелизСтатусПримечание
artful

not-affected

bionic

not-affected

cosmic

not-affected

devel

not-affected

disco

not-affected

eoan

not-affected

esm-infra-legacy/trusty

not-affected

esm-infra/bionic

not-affected

esm-infra/focal

not-affected

esm-infra/xenial

not-affected

Показывать по

EPSS

Процентиль: 38%
0.00159
Низкий

7.2 High

CVSS2

7.8 High

CVSS3

Связанные уязвимости

redhat
около 21 года назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

CVSS3: 7.8
nvd
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

CVSS3: 7.8
debian
почти 6 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo ...

CVSS3: 7.8
github
больше 3 лет назад

There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.

EPSS

Процентиль: 38%
0.00159
Низкий

7.2 High

CVSS2

7.8 High

CVSS3