First published: Thu Oct 18 2001(Updated: )
Race condition in signal handling of procmail 3.20 and earlier, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
procmail | <=3.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0905 is classified as a high severity vulnerability due to its potential for local users to gain root privileges.
To fix CVE-2001-0905, upgrade to procmail version 3.21 or later, which addresses this race condition.
CVE-2001-0905 can allow a local user to cause a denial of service or escalate privileges to root.
CVE-2001-0905 is present in procmail versions 3.20 and earlier.
Local users of systems running vulnerable versions of procmail with setuid permissions are affected by CVE-2001-0905.