First published: Tue Jul 10 2001(Updated: )
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1180 is classified as a local privilege escalation vulnerability.
To fix CVE-2001-1180, you should update your FreeBSD system to a version higher than 4.3 that has addressed this vulnerability.
CVE-2001-1180 affects FreeBSD versions 4.0, 4.1, 4.2, and 4.3.
No, CVE-2001-1180 requires local access for exploitation.
The impact of exploiting CVE-2001-1180 allows local users to gain elevated privileges through a setuid program.