First published: Thu Dec 06 2001(Updated: )
The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sgi Performance Co-pilot | =2.1.7 | |
Sgi Performance Co-pilot | =2.1.9 | |
Sgi Performance Co-pilot | =2.1.10 | |
Sgi Performance Co-pilot | =2.1.11 | |
Sgi Performance Co-pilot | =2.2 | |
Sgi Performance Co-pilot | =2.1.3 | |
Sgi Performance Co-pilot | =2.1.5 | |
Sgi Performance Co-pilot | =2.1.2 | |
Sgi Performance Co-pilot | =2.1.6 | |
Sgi Performance Co-pilot | =2.1.8 | |
Sgi Performance Co-pilot | =2.1.1 | |
Sgi Performance Co-pilot | =2.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0823 has a moderate severity rating due to the potential for local privilege escalation.
To fix CVE-2001-0823, update Performance Co-Pilot to version 2.2.1-3 or later.
CVE-2001-0823 affects Performance Co-Pilot versions 2.1.1 through 2.2.0.
CVE-2001-0823 is a local privilege escalation vulnerability due to a symlink attack.
Local users on systems running vulnerable versions of Performance Co-Pilot are affected by CVE-2001-0823.