CVE-2005-4158

N/A Unknown
Published: December 11, 2005 Modified: April 16, 2026
View on NVD

Description

Sudo before 1.6.8 p12, when the Perl taint flag is off, does not clear the (1) PERLLIB, (2) PERL5LIB, and (3) PERL5OPT environment variables, which allows limited local users to cause a Perl script to include and execute arbitrary library files that have the same name as library files that are included by the script.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/17534/
Source: cve@mitre.org
Patch Vendor Advisory
http://www.securityfocus.com/bid/15394
Source: cve@mitre.org
Exploit Patch
http://www.sudo.ws/sudo/alerts/perl_env.html
Source: cve@mitre.org
Patch Vendor Advisory
http://secunia.com/advisories/17534/
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/18102
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18156
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18308
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18463
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18549
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/18558
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21692
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/alerts/2005/Nov/1015192.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.debian.org/security/2006/dsa-946
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2005:234
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDKSA-2006:159
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_02_sr.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15394
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.sudo.ws/sudo/alerts/perl_env.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.trustix.org/errata/2006/0002/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2386
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/23102
Source: af854a3a-2127-422b-91ae-364da2661108
https://www.ubuntu.com/usn/usn-235-1/
Source: af854a3a-2127-422b-91ae-364da2661108

38 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.8%
75th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

todd_miller