CVE-2001-0061

procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:4.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:34

Type Values Removed Values Added
References () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc - Patch, Vendor Advisory () ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc - Patch, Vendor Advisory
References () http://www.osvdb.org/1697 - () http://www.osvdb.org/1697 -
References () http://www.securityfocus.com/bid/2130 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/2130 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/6106 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/6106 -

Information

Published : 2001-02-12 05:00

Updated : 2024-11-20 23:34


NVD link : CVE-2001-0061

Mitre link : CVE-2001-0061

CVE.ORG link : CVE-2001-0061


JSON object : View

Products Affected

freebsd

  • freebsd