There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-08T00:01:23.403Z
Reserved: 2011-12-19T00:00:00
Link: CVE-2005-4890

No data.

Status : Modified
Published: 2019-11-04T19:15:10.130
Modified: 2024-11-21T00:05:25.703
Link: CVE-2005-4890
