Description
sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
CVSS Metrics
- Vector
- AV:L/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- local
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- MANDRAKESOFT
- Published
- 3/1/2005
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
mandrakesoft : mandrake_multi_network_firewalltodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudotodd_miller : sudodebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxdebian : debian_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linuxmandrakesoft : mandrake_linux_corporate_servermandrakesoft : mandrake_linux_corporate_servertrustix : secure_linuxtrustix : secure_linuxtrustix : secure_linuxtrustix : secure_linuxubuntu : ubuntu_linuxubuntu : ubuntu_linux
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.