sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit.
References
Link | Resource |
---|---|
http://packetstormsecurity.nl/0409-exploits/sudoedit.txt | Patch Vendor Advisory |
http://www.sudo.ws/sudo/alerts/sudoedit.html | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/424358 | Patch Third Party Advisory US Government Resource |
http://www.ciac.org/ciac/bulletins/o-219.shtml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/11204 | Exploit Patch Vendor Advisory |
http://www.osvdb.org/10023 | Patch Vendor Advisory |
http://secunia.com/advisories/12596 | Patch Vendor Advisory |
http://marc.info/?l=bugtraq&m=109537972929201&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17424 |
Configurations
Information
Published : 2004-09-15 21:00
Updated : 2017-07-10 18:31
NVD link : CVE-2004-1689
Mitre link : CVE-2004-1689
JSON object : View
CWE
Products Affected
todd_miller
- sudo