The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR).
                
            References
                    | Link | Resource | 
|---|---|
| ftp://patches.sgi.com/support/free/security/advisories/20010601-01-A | Patch | 
| http://archives.neohapsis.com/archives/bugtraq/2001-06/0245.html | Patch Vendor Advisory | 
| http://marc.info/?l=bugtraq&m=99290754901708&w=2 | |
| http://www.securityfocus.com/bid/2887 | Exploit Patch Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/6724 | |
| ftp://patches.sgi.com/support/free/security/advisories/20010601-01-A | Patch | 
| http://archives.neohapsis.com/archives/bugtraq/2001-06/0245.html | Patch Vendor Advisory | 
| http://marc.info/?l=bugtraq&m=99290754901708&w=2 | |
| http://www.securityfocus.com/bid/2887 | Exploit Patch Vendor Advisory | 
| https://exchange.xforce.ibmcloud.com/vulnerabilities/6724 | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2001-12-06 05:00
Updated : 2025-04-03 01:03
NVD link : CVE-2001-0823
Mitre link : CVE-2001-0823
CVE.ORG link : CVE-2001-0823
JSON object : View
Products Affected
                sgi
- performance_co-pilot
CWE
                