First published: Fri Oct 12 2001(Updated: )
Hitachi Super-H architecture in NetBSD 1.5 and 1.4.1 allows a local user to gain privileges via modified Status Register contents, which are not properly handled by (1) the sigreturn system call or (2) the process_write_regs kernel routine.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =1.5 | |
NetBSD NetBSD | =1.4.1 | |
NetBSD current | =1.4.1 | |
NetBSD current | =1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0734 is considered a high-severity vulnerability due to its potential for local privilege escalation.
To fix CVE-2001-0734, update to a patched version of NetBSD that addresses this vulnerability.
Local users on systems running NetBSD versions 1.4.1 and 1.5 are affected by CVE-2001-0734.
CVE-2001-0734 is caused by improper handling of modified Status Register contents during specific system calls.
Yes, CVE-2001-0734 specifically affects the Hitachi Super-H architecture in the identified versions of NetBSD.