Potential TTY Hijacking in Shadow and Sudo Software by Vendor
CVE-2005-4890
7.8HIGH
Summary
A vulnerability exists in Shadow and Sudo where a user can potentially execute arbitrary commands in an elevated session by exploiting the TIOCSTI ioctl system call. This allows for the manipulation of the input buffer in a way that can permit the escape of the user session back to its parent, enabling unauthorized access to the host system. This issue affects Shadow versions earlier than 4.1.5 and Sudo versions before 1.7.4, highlighting the importance of timely updates and security assessments.
Affected Version(s)
shadow 4.x before 4.1.5
sudo 1.x before 1.7.4
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved