Vulnerability Description
initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gain root privileges via unknown vectors.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Enterprise Linux | 3.0 |
References
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://secunia.com/advisories/19162PatchVendor Advisory
- http://secunia.com/advisories/19532
- http://securitytracker.com/id?1015732PatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2006-0015.html
- http://www.redhat.com/support/errata/RHSA-2006-0016.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/17038
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25374
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
- http://secunia.com/advisories/19162PatchVendor Advisory
- http://secunia.com/advisories/19532
- http://securitytracker.com/id?1015732PatchVendor Advisory
- http://www.redhat.com/support/errata/RHSA-2006-0015.html
- http://www.redhat.com/support/errata/RHSA-2006-0016.htmlPatchVendor Advisory
FAQ
What is CVE-2005-3629?
CVE-2005-3629 is a vulnerability with a CVSS score of 7.2 (HIGH). initscripts in Red Hat Enterprise Linux 4 does not properly handle certain environment variables when /sbin/service is executed, which allows local users with sudo permissions for /sbin/service to gai...
How severe is CVE-2005-3629?
CVE-2005-3629 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3629?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Enterprise Linux.