suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2000-10-13T04:00:00

Updated: 2024-08-08T05:28:41.432Z

Reserved: 2000-09-19T00:00:00

Link: CVE-2000-0703

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2000-10-20T04:00:00.000

Modified: 2024-11-20T23:33:06.090

Link: CVE-2000-0703

cve-icon Redhat

Severity :

Publid Date: 2000-08-07T00:00:00Z

Links: CVE-2000-0703 - Bugzilla