FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
References
Link | Resource |
---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.asc | |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.html | Exploit Patch Vendor Advisory |
http://ciac.llnl.gov/ciac/bulletins/l-111.shtml | |
http://www.kb.cert.org/vuls/id/943633 | Patch Third Party Advisory US Government Resource |
http://www.osvdb.org/1897 | |
http://www.securityfocus.com/bid/3007 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6829 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2001-07-10 04:00
Updated : 2024-02-04 16:31
NVD link : CVE-2001-1180
Mitre link : CVE-2001-1180
CVE.ORG link : CVE-2001-1180
JSON object : View
Products Affected
freebsd
- freebsd
CWE