There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
2019-11-04T19:15:10.130
2024-11-21T00:05:25.703
Modified
CVSSv3.1: 7.8 (HIGH)
AV:L/AC:L/Au:N/C:C/I:C/A:C
3.9
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | debian | shadow | ≤ 4.1.5 | Yes |
Application | sudo_project | sudo | ≤ 1.7.4 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | redhat | enterprise_linux | 4 | Yes |
Operating System | redhat | enterprise_linux | 5 | Yes |
Operating System | redhat | enterprise_linux | 6.0 | Yes |