The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html - | |
References | () http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html - | |
References | () http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/358960 - US Government Resource | |
References | () http://www.openbsd.org/errata.html#userldt - | |
References | () http://www.osvdb.org/6141 - | |
References | () http://www.securityfocus.com/bid/2739 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/6222 - |
Information
Published : 2001-05-03 04:00
Updated : 2024-11-20 23:34
NVD link : CVE-2001-0268
Mitre link : CVE-2001-0268
CVE.ORG link : CVE-2001-0268
JSON object : View
Products Affected
netbsd
- netbsd
openbsd
- openbsd
CWE