First published: Mon Feb 12 2001(Updated: )
procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =3.5.1 | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0061 is considered a critical vulnerability due to its potential for allowing local users to gain root privileges.
To fix CVE-2001-0061, users should update to the latest version of FreeBSD where the vulnerability has been patched.
CVE-2001-0061 primarily affects FreeBSD versions 3.5.1, 4.1, 4.1.1, and 4.2.
CVE-2001-0061 cannot be exploited remotely as it requires local user access to the affected system.
Exploiting CVE-2001-0061 can allow a local user to execute a privileged process, potentially gaining root access to the system.