First published: Mon Aug 12 2002(Updated: )
Kerberos 5 su (k5su) in FreeBSD 4.4 and earlier relies on the getlogin system call to determine if the user running k5su is root, which could allow a root-initiated process to regain its privileges after it has dropped them.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
heimdal | =0.4e | |
Heimdal | =0.4e | |
FreeBSD Kernel | =4.1.1-stable | |
FreeBSD Kernel | =4.1.1-release | |
FreeBSD Kernel | =4.3-stable | |
FreeBSD Kernel | =4.3-release | |
FreeBSD Kernel | =4.2-stable | |
FreeBSD Kernel | =4.1 | |
FreeBSD Kernel | =4.4 | |
FreeBSD Kernel | =4.2 | |
FreeBSD Kernel | =4.0 | |
FreeBSD Kernel | =4.1.1 | |
FreeBSD Kernel | =4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0754 is considered a high-severity vulnerability because it can allow unauthorized users to regain root privileges.
To fix CVE-2002-0754, it is recommended to upgrade to a patched version of FreeBSD or Heimdal that addresses this vulnerability.
CVE-2002-0754 affects FreeBSD versions 4.0 to 4.4 and Heimdal version 0.4e.
CVE-2002-0754 is a privilege escalation vulnerability that exploits the getlogin() system call in FreeBSD.
CVE-2002-0754 typically requires local access to the system to exploit, making it less likely to be remotely exploited.