CVE-2000-0703
Summary
| CVE | CVE-2000-0703 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2000-10-20 04:00:00 UTC |
| Updated | 2008-09-10 19:05:00 UTC |
| Description | suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Larry Wall | Perl | 5.4.5 | All | All | All |
| Application | Larry Wall | Perl | 5.5 | All | All | All |
| Application | Larry Wall | Perl | 5.5.3 | All | All | All |
| Application | Larry Wall | Perl | 5.6 | All | All | All |
| Application | Larry Wall | Perl | 5.4.5 | All | All | All |
| Application | Larry Wall | Perl | 5.5 | All | All | All |
| Application | Larry Wall | Perl | 5.5.3 | All | All | All |
| Application | Larry Wall | Perl | 5.6 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Xinuos Inc. | Support | Security | Advisories | Document Not Found | CALDERA | www.calderasystems.com | Patch, Vendor Advisory |
| 20000808 MDKSA-2000:031 perl update | BUGTRAQ | archives.neohapsis.com | |
| 20000810 Conectiva Linux security announcemente - PERL | BUGTRAQ | archives.neohapsis.com | |
| [TL-Security-Announce] perl TLSA2000018-1 | TURBO | www.turbolinux.com | |
| SuidPerl Mail Shell Escape Vulnerability | BID | www.securityfocus.com | Exploit, Patch, Vendor Advisory |
| 404 Page Not Found | SUSE | SUSE | www.novell.com | |
| 20000814 Trustix Security Advisory - perl and mailx | BUGTRAQ | archives.neohapsis.com | |
| Support | REDHAT | www.redhat.com | |
| 20000805 sperl 5.00503 (and newer ;) exploit | BUGTRAQ | archives.neohapsis.com | Exploit, Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.