First published: Wed Feb 14 2001(Updated: )
cron in OpenBSD 2.5 allows local users to gain root privileges via an argv[] that is not NULL terminated, which is passed to cron's fake popen function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0312 is classified as a high severity vulnerability due to the potential for local users to gain root privileges.
To fix CVE-2000-0312, it is recommended to update OpenBSD to a version later than 2.5 that has patched this vulnerability.
CVE-2000-0312 specifically affects OpenBSD version 2.5.
Local users on systems running OpenBSD 2.5 are impacted by CVE-2000-0312, as it allows them to escalate privileges.
CVE-2000-0312 exploits a failure in cron to properly handle non-NULL terminated argv[], leading to privilege escalation.