First published: Wed Mar 17 1999(Updated: )
suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Linux | =5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0462 is considered to be a high severity vulnerability due to its potential to allow local users to gain root access.
To mitigate CVE-1999-0462, ensure that the nosuid mount option is enabled for any file systems where untrusted users can write files.
CVE-1999-0462 specifically affects SUSE Linux version 5.3, where suidperl does not check the nosuid mount option.
The main risk of CVE-1999-0462 is that local users can exploit the vulnerability to execute setuid scripts, potentially gaining unauthorized root access.
While CVE-1999-0462 is an older vulnerability, it is still relevant for legacy systems running unsupported versions of SUSE Linux.