Vulnerability Details : CVE-2005-1831
Sudo 1.6.8p7 on SuSE Linux 9.3, and possibly other Linux distributions, allows local users to gain privileges by using sudo to call su, then entering a blank password and hitting CTRL-C. NOTE: SuSE and multiple third-party researchers have not been able to replicate this issue, stating "Sudo catches SIGINT and returns an empty string for the password so I don't see how this could happen unless the user's actual password was empty.
Exploit prediction scoring system (EPSS) score for CVE-2005-1831
Probability of exploitation activity in the next 30 days: 0.04%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 6 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2005-1831
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
References for CVE-2005-1831
-
http://marc.info/?l=bugtraq&m=111755694008928&w=2
'[XNUXER-SECURITY] Root Privilige Escalation in Sudo version 1.6.8p7 without Password, SuSE 9.3' - MARC
-
http://archives.neohapsis.com/archives/bugtraq/2005-05/0359.html
-
http://www.osvdb.org/20417
404 Not Found
-
http://archives.neohapsis.com/archives/bugtraq/2005-05/0349.html
Products affected by CVE-2005-1831
- cpe:2.3:a:todd_miller:sudo:1.6.8p7:*:*:*:*:*:*:*