FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
References
Link | Resource |
---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.asc | |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.html | Exploit Patch Vendor Advisory |
http://ciac.llnl.gov/ciac/bulletins/l-111.shtml | |
http://www.kb.cert.org/vuls/id/943633 | Patch Third Party Advisory US Government Resource |
http://www.osvdb.org/1897 | |
http://www.securityfocus.com/bid/3007 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6829 |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2002-06-25T04:00:00
Updated: 2002-03-22T10:00:00
Reserved: 2002-03-15T00:00:00
Link: CVE-2001-1180
JSON object: View
NVD Information
Status : Modified
Published: 2001-07-10T04:00:00.000
Modified: 2017-10-10T01:30:01.733
Link: CVE-2001-1180
JSON object: View
Redhat Information
No data.
CWE