Search for vulnerabilities
Vulnerability ID | VCID-kp17-amnu-aaas |
Aliases |
CVE-2005-4158
|
Summary | Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 4.1 |
Risk | 8.2 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Exploit-DB |
---|---|
Date added | Nov. 11, 2005 |
Description | Sudo Perl 1.6.x - Environment Variable Handling Security Bypass |
Ransomware campaign use | Known |
Source publication date | Nov. 11, 2005 |
Exploit type | local |
Platform | linux |
Source update date | July 1, 2013 |
Source URL | https://www.securityfocus.com/bid/15394/info |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.00344 |
EPSS Score | 0.00042 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |