CVE-2005-4890
Publication date 4 November 2019
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| sudo | ||
| 20.04 LTS focal |
Not affected
|
|
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
|
| shadow | ||
| 20.04 LTS focal |
Not affected
|
|
| 18.04 LTS bionic |
Not affected
|
|
| 16.04 LTS xenial |
Not affected
|
|
| 14.04 LTS trusty |
Not affected
|
|
Notes
mdeslaur
sudo is also apprently vulnerable to this, so the use_pty option was added. We need to verify versions, and make sure it is actually getting honored (apparently the option wasn't working: http://www.openwall.com/lists/oss-security/2011/06/22/4)
jdstrand
sudo in 12.04 and higher has the fix for use_pty. A small patch (http://www.sudo.ws/repos/sudo/rev/8d95a163dfc1) can be used to enable it on Ubuntu 11.04 and 11.10.
mdeslaur
Please note that use_pty is not enabled by default in sudo, it must be specifically enabled.
seth-arnold
su interactive has the same problem, no fix known on 20130305
Patch details
| Package | Patch details |
|---|---|
| sudo |
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
Other references
- http://www.openwall.com/lists/oss-security/2011/06/02/3
- http://www.openwall.com/lists/oss-security/2012/11/05/8
- http://www.ush.it/2009/01/06/25c3-ccc-congress-2008-tricks-makes-you-smile/
- http://www.redhat.com/archives/fedora-devel-list/2004-July/msg01314.html
- https://www.cve.org/CVERecord?id=CVE-2005-4890