First published: Tue Aug 14 2001(Updated: )
Red Hat Linux 7.1 sets insecure permissions on swap files created during installation, which can allow a local attacker to gain additional privileges by reading sensitive information from the swap file, such as passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0635 is considered a moderate severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2001-0635, ensure that swap files have secure permissions by applying the appropriate security updates for Red Hat Linux 7.1.
CVE-2001-0635 affects users of Red Hat Linux version 7.1 due to insecure permissions on swap files.
A local attacker can exploit CVE-2001-0635 to gain unauthorized access to sensitive information, including passwords, stored in the insecure swap files.
CVE-2001-0635 is primarily a concern for legacy systems running Red Hat Linux 7.1, as it has been addressed in later versions.