itetris/xitetris 1.6.2 and earlier trusts the PATH environmental variable to find and execute the gunzip program, which allows local users to gain root privileges by changing their PATH so that it points to a malicious gunzip program.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-12/0295.html | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/2139 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5795 | |
http://archives.neohapsis.com/archives/bugtraq/2000-12/0295.html | Exploit Vendor Advisory |
http://www.securityfocus.com/bid/2139 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5795 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2000-12/0295.html - Exploit, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/2139 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/5795 - |
Information
Published : 2001-02-12 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-0087
Mitre link : CVE-2001-0087
CVE.ORG link : CVE-2001-0087
JSON object : View
Products Affected
michael_glickman
- itetris
CWE