First published: Tue Jun 11 2002(Updated: )
FreeBSD 4.5 and earlier, and possibly other BSD-based operating systems, allows local users to write to or read from restricted files by closing the file descriptors 0 (standard input), 1 (standard output), or 2 (standard error), which may then be reused by a called setuid process that intended to perform I/O on normal files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Solaris and Zettabyte File System (ZFS) | =2.5.1 | |
FreeBSD Kernel | =4.5-stable | |
FreeBSD Kernel | =4.5-release | |
OpenBSD | =2.1 | |
Sun SunOS | =5.7 | |
OpenBSD | =2.2 | |
Sun SunOS | =5.8 | |
OpenBSD | =2.0 | |
FreeBSD Kernel | =4.4-releng | |
Oracle Solaris and Zettabyte File System (ZFS) | =7.0 | |
Sun SunOS | =5.5.1 | |
OpenBSD | =2.3 | |
Oracle Solaris and Zettabyte File System (ZFS) | =2.6 | |
Oracle Solaris and Zettabyte File System (ZFS) | =8.0 | |
Sun SunOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0572 is considered a moderate severity vulnerability due to its potential to allow local users unauthorized access to restricted files.
To mitigate CVE-2002-0572, ensure proper file descriptor management and limit the use of setuid processes where possible.
CVE-2002-0572 affects local users on FreeBSD 4.5 and earlier, Solaris 2.5.1 and 2.6, and certain versions of OpenBSD.
CVE-2002-0572 is a local privilege escalation vulnerability that can be exploited by closing standard file descriptors.
No, CVE-2002-0572 cannot be exploited remotely as it requires local access to the system.