CVE-2005-4890
Publication date 4 November 2019
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
Status
Package | Ubuntu Release | Status |
---|---|---|
shadow | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
sudo | ||
20.04 LTS focal |
Not affected
|
|
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
Notes
mdeslaur
sudo is also apprently vulnerable to this, so the use_pty option was added. We need to verify versions, and make sure it is actually getting honored (apparently the option wasn't working: http://www.openwall.com/lists/oss-security/2011/06/22/4)
jdstrand
sudo in 12.04 and higher has the fix for use_pty. A small patch (http://www.sudo.ws/repos/sudo/rev/8d95a163dfc1) can be used to enable it on Ubuntu 11.04 and 11.10.
mdeslaur
Please note that use_pty is not enabled by default in sudo, it must be specifically enabled.
seth-arnold
su interactive has the same problem, no fix known on 20130305
Patch details
Package | Patch details |
---|---|
sudo |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 · High |
Attack vector | Local |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Other references
- http://www.openwall.com/lists/oss-security/2011/06/02/3
- http://www.openwall.com/lists/oss-security/2012/11/05/8
- http://www.ush.it/2009/01/06/25c3-ccc-congress-2008-tricks-makes-you-smile/
- http://www.redhat.com/archives/fedora-devel-list/2004-July/msg01314.html
- https://www.cve.org/CVERecord?id=CVE-2005-4890