CVE-2004-1051
Summary
| CVE | CVE-2004-1051 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-03-01 05:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname. |
Risk And Classification
Primary CVSS: v2.0 7.2 from [email protected]
AV:L/AC:L/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
LowAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:L/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 3.0 | All | alpha | All |
| Operating System | Debian | Debian Linux | 3.0 | All | arm | All |
| Operating System | Debian | Debian Linux | 3.0 | All | hppa | All |
| Operating System | Debian | Debian Linux | 3.0 | All | ia-32 | All |
| Operating System | Debian | Debian Linux | 3.0 | All | ia-64 | All |
| Operating System | Debian | Debian Linux | 3.0 | All | m68k | All |
| Operating System | Debian | Debian Linux | 3.0 | All | mips | All |
| Operating System | Debian | Debian Linux | 3.0 | All | mipsel | All |
| Operating System | Debian | Debian Linux | 3.0 | All | ppc | All |
| Operating System | Debian | Debian Linux | 3.0 | All | s-390 | All |
| Operating System | Debian | Debian Linux | 3.0 | All | sparc | All |
| Operating System | Mandrakesoft | Mandrake Linux | 10.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 10.0 | All | amd64 | All |
| Operating System | Mandrakesoft | Mandrake Linux | 10.1 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 10.1 | All | x86_64 | All |
| Operating System | Mandrakesoft | Mandrake Linux | 9.2 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 9.2 | All | amd64 | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 2.1 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 2.1 | All | x86_64 | All |
| Application | Mandrakesoft | Mandrake Multi Network Firewall | 8.2 | All | All | All |
| Application | Todd Miller | Sudo | 1.5.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.5.7 | All | All | All |
| Application | Todd Miller | Sudo | 1.5.8 | All | All | All |
| Application | Todd Miller | Sudo | 1.5.9 | All | All | All |
| Application | Todd Miller | Sudo | 1.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.1 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.2 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p3 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p4 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p5 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p6 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.3_p7 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.4 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.4_p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.4_p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.5 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.5_p1 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.5_p2 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.6 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.7 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.8 | All | All | All |
| Application | Todd Miller | Sudo | 1.6.8_p1 | All | All | All |
| Operating System | Trustix | Secure Linux | 1.5 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.1 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.2 | All | All | All |
| Operating System | Ubuntu | Ubuntu Linux | 4.1 | All | ia64 | All |
| Operating System | Ubuntu | Ubuntu Linux | 4.1 | All | ppc | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 'Sudo version 1.6.8p2 now available (fwd)' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Resend: APPLE-SA-2005-05-03 Security Update 2005-005 | af854a3a-2127-422b-91ae-364da2661108 | lists.apple.com | |
| GratiSoft Sudo Restricted Command Execution Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Patch, Vendor Advisory |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| www.trustix.org/errata/2004/0061 | af854a3a-2127-422b-91ae-364da2661108 | www.trustix.org | |
| usn/usn-28-1 - Ubuntu Linux | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Advisories - Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Bash scripts run via Sudo can be subverted | af854a3a-2127-422b-91ae-364da2661108 | www.sudo.ws | |
| '[OpenPKG-SA-2005.002] OpenPKG Security Advisory (sudo)' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Debian -- Security Information -- DSA-596-2 sudo | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2006-08-30 | Mark J Cox | We do not consider this to be a security issue: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=139478#c1 |
There are currently no legacy QID mappings associated with this CVE.