FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/3007 | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/943633 | Patch Third Party Advisory US Government Resource |
http://ciac.llnl.gov/ciac/bulletins/l-111.shtml | |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.asc | |
http://www.osvdb.org/1897 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6829 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2001-07-09 21:00
Updated : 2017-10-09 18:30
NVD link : CVE-2001-1180
Mitre link : CVE-2001-1180
JSON object : View
CWE
Products Affected
freebsd
- freebsd