suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2000-10-13T04:00:00
Updated: 2024-08-08T05:28:41.432Z
Reserved: 2000-09-19T00:00:00
Link: CVE-2000-0703
Vulnrichment
No data.
NVD
Status : Modified
Published: 2000-10-20T04:00:00.000
Modified: 2024-11-20T23:33:06.090
Link: CVE-2000-0703
Redhat