First published: Fri Oct 13 2000(Updated: )
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Perl | =5.6 | |
Perl | =5.5 | |
Perl | =5.5.3 | |
Perl | =5.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0703 has been assigned a moderate severity rating due to its potential for privilege escalation.
To fix CVE-2000-0703, users should upgrade to a newer version of Perl that does not include the vulnerable suidperl functionality.
CVE-2000-0703 affects local users running versions of Perl 5.4.5, 5.5, and 5.6 that utilize the suidperl feature.
CVE-2000-0703 cannot be exploited remotely as it requires local access to the system.
Suidperl is a setuid version of Perl that allows users to run scripts with elevated privileges, making it susceptible to the vulnerability described in CVE-2000-0703.