procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
References
Link | Resource |
---|---|
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc | Patch Vendor Advisory |
http://www.osvdb.org/1697 | |
http://www.securityfocus.com/bid/2130 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6106 | |
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc | Patch Vendor Advisory |
http://www.osvdb.org/1697 | |
http://www.securityfocus.com/bid/2130 | Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6106 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2001-02-12 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-0061
Mitre link : CVE-2001-0061
CVE.ORG link : CVE-2001-0061
JSON object : View
Products Affected
freebsd
- freebsd
CWE