Potential TTY Hijacking in Shadow and Sudo Software by Vendor
CVE-2005-4890
7.8HIGH
What is CVE-2005-4890?
A vulnerability exists in Shadow and Sudo where a user can potentially execute arbitrary commands in an elevated session by exploiting the TIOCSTI ioctl system call. This allows for the manipulation of the input buffer in a way that can permit the escape of the user session back to its parent, enabling unauthorized access to the host system. This issue affects Shadow versions earlier than 4.1.5 and Sudo versions before 1.7.4, highlighting the importance of timely updates and security assessments.
Affected Version(s)
shadow 4.x before 4.1.5
sudo 1.x before 1.7.4