suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2000-10-13T04:00:00

Updated: 2004-09-02T09:00:00

Reserved: 2000-09-19T00:00:00


Link: CVE-2000-0703

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2000-10-20T04:00:00.000

Modified: 2008-09-10T19:05:39.807


Link: CVE-2000-0703

JSON object: View

cve-icon Redhat Information

No data.