First published: Thu May 24 2001(Updated: )
BubbleMon 1.31 does not properly drop group privileges before executing programs, which allows local users to execute arbitrary commands with the kmem group id.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Timecop Wmcube Gdk | =1.0pl7 | |
Timecop Wmcube Gdk | =1.23 | |
Timecop Wmcube Gdk | =1.0pl3 | |
Timecop Wmcube Gdk | =1.22 | |
Timecop Wmcube Gdk | =1.0pl6 | |
Timecop Wmcube Gdk | =1.31 | |
Timecop Wmcube Gdk | =1.1test3 | |
Timecop Wmcube Gdk | =1.0pl4 | |
Timecop Wmcube Gdk | =1.21test1 | |
Timecop Wmcube Gdk | =1.0pl2 | |
Timecop Wmcube Gdk | =1.3 | |
Timecop Wmcube Gdk | =1.0 | |
Timecop Wmcube Gdk | =1.1test5 | |
Timecop Wmcube Gdk | =1.21 | |
Timecop Wmcube Gdk | =1.2 | |
Timecop Wmcube Gdk | =1.1test2 | |
Timecop Wmcube Gdk | =1.1test7 | |
Timecop Wmcube Gdk | =1.0pl1 | |
Timecop Wmcube Gdk | =1.0pl9 | |
Timecop Wmcube Gdk | =1.2test1 | |
Timecop Wmcube Gdk | =1.1test6 | |
Timecop Wmcube Gdk | =1.0pl8 | |
Timecop Wmcube Gdk | =1.1test1 | |
Timecop Wmcube Gdk | =1.1 | |
Timecop Wmcube Gdk | =1.1test4 | |
FreeBSD Kernel | =6.2-stable |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0424 has been classified as a high severity vulnerability due to the potential for local users to execute arbitrary commands.
To fix CVE-2001-0424, ensure that the application properly drops group privileges before executing any programs.
CVE-2001-0424 affects BubbleMon versions 1.0, 1.0pl1 through 1.0pl9, and all versions up to 1.31.
No, CVE-2001-0424 is a local vulnerability, meaning only local users can exploit this flaw.
CVE-2001-0424 is a privilege escalation vulnerability that allows local users to gain elevated permissions.