sudo before 1.6.8p2 allows local users to execute arbitrary commands by using "()" style environment variables to create functions that have the same name as any program within the bash script that is called without using the program's full pathname.
http://lists.apple.com/archives/security-announce/2005/May/msg00001.html
http://marc.info/?l=bugtraq&m=110028877431192&w=2
http://marc.info/?l=bugtraq&m=110598298225675&w=2
http://www.debian.org/security/2004/dsa-596
http://www.mandriva.com/security/advisories?name=MDKSA-2004:133
http://www.securityfocus.com/bid/11668
http://www.sudo.ws/sudo/alerts/bash_functions.html
http://www.trustix.org/errata/2004/0061/
Source: MITRE
Published: 2005-03-01
Updated: 2017-07-11
Type: NVD-CWE-Other
Base Score: 7.2
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 3.9
Severity: HIGH