initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U - | |
References | () http://secunia.com/advisories/19162 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/19532 - | |
References | () http://securitytracker.com/id?1015732 - Patch, Vendor Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0015.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0016.html - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/17038 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/25374 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11198 - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3629
Mitre link : CVE-2005-3629
CVE.ORG link : CVE-2005-3629
JSON object : View
Products Affected
redhat
- enterprise_linux
CWE