There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
References
| Link | Resource |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890 | Issue Tracking Third Party Advisory |
| https://access.redhat.com/security/cve/cve-2005-4890 | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2013/05/20/3 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2014/10/20/9 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2013/11/29/5 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2013/11/28/10 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2016/02/25/6 | Exploit Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2014/12/15/5 | Mailing List Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2014/10/21/1 | Mailing List Third Party Advisory |
| https://security-tracker.debian.org/tracker/CVE-2005-4890 | Third Party Advisory |
| http://www.openwall.com/lists/oss-security/2012/11/06/8 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Information
Published : 2019-11-04 11:15
Updated : 2020-08-18 08:05
NVD link : CVE-2005-4890
Mitre link : CVE-2005-4890
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
debian
- debian_linux
- shadow
sudo_project
- sudo
redhat
- enterprise_linux


