FreeBSD : sudo -- arbitrary command execution (1b725079-9ef6-11da-b410-000e0c2e438a)

Medium Nessus Plugin ID 21392


The remote FreeBSD host is missing a security-related update.


Tavis Ormandy reports :

The bash shell uses the value of the PS4 environment variable (after expansion) as a prefix for commands run in execution trace mode.
Execution trace mode (xtrace) is normally set via bash's -x command line option or interactively by running 'set -o xtrace'. However, it may also be enabled by placing the string 'xtrace' in the SHELLOPTS environment variable before bash is started.

A malicious user with sudo access to a shell script that uses bash can use this feature to run arbitrary commands for each line of the script.


Update the affected package.

See Also

Plugin Details

Severity: Medium

ID: 21392

File Name: freebsd_pkg_1b7250799ef611dab410000e0c2e438a.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2006/05/13

Modified: 2016/05/09

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.6

Temporal Score: 4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:sudo, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2006/02/16

Vulnerability Publication Date: 2005/10/25

Reference Information

CVE: CVE-2005-2959

BID: 15191