First published: Mon Mar 29 2004(Updated: )
The jail_attach system call in FreeBSD 5.1 and 5.2 changes the directory of a calling process even if the process doesn't have permission to change directory, which allows local users to gain read/write privileges to files and directories within another jail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =5.1 | |
FreeBSD Kernel | =5.1-release | |
FreeBSD Kernel | =5.2 | |
FreeBSD Kernel | =5.2.1-release |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0126 is classified as a high-severity vulnerability due to its potential to allow unauthorized access to files and directories within a FreeBSD jail.
To fix CVE-2004-0126, update your FreeBSD installation to a version later than 5.2.1 that contains the relevant security patches.
CVE-2004-0126 affects local users on FreeBSD versions 5.1 and 5.2, allowing them to exploit the jail_attach system call.
The consequences of CVE-2004-0126 include the possibility for local users to gain elevated read/write privileges within another jail.
FreeBSD 5.1 and 5.2, including their release versions, are vulnerable to CVE-2004-0126.