Vulnerability Details : CVE-2004-1689
sudoedit (aka sudo -e) in sudo 1.6.8 opens a temporary file with root privileges, which allows local users to read arbitrary files via a symlink attack on the temporary file before quitting sudoedit.
Products affected by CVE-2004-1689
- cpe:2.3:a:todd_miller:sudo:1.6.8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1689
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 8 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1689
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST |
References for CVE-2004-1689
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17424
Sudo sudoedit view files CVE-2004-1689 Vulnerability Report
-
http://marc.info/?l=bugtraq&m=109537972929201&w=2
'[sudo-announce] Sudo version 1.6.8p1 now available (fwd)' - MARC
-
http://www.kb.cert.org/vuls/id/424358
VU#424358 - sudoedit can expose protected file contentsPatch;Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/11204
Exploit;Patch;Vendor Advisory
-
http://www.sudo.ws/sudo/alerts/sudoedit.html
Sudoedit can expose file contents | SudoPatch;Vendor Advisory
-
http://packetstormsecurity.nl/0409-exploits/sudoedit.txt
Patch;Vendor Advisory
-
http://www.ciac.org/ciac/bulletins/o-219.shtml
Patch;Vendor Advisory
Jump to