First published: Thu May 03 2001(Updated: )
The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenBSD | <=2.8 | |
NetBSD current | <=1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0268 has a critical severity rating due to its potential to allow local users to gain root privileges.
To fix CVE-2001-0268, users should upgrade to a version of OpenBSD later than 2.8 or NetBSD later than 1.5, where this vulnerability is patched.
CVE-2001-0268 affects local users of NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier when the USER_LDT kernel option is enabled.
CVE-2001-0268 exploits the lack of validation on a call gate target in the i386_set_ldt system call.
No, CVE-2001-0268 requires local access to the system to exploit the vulnerability.