Vulnerability Description
procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 3.5.1 |
References
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.aPatchVendor Advisory
- http://www.osvdb.org/1697
- http://www.securityfocus.com/bid/2130PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6106
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.aPatchVendor Advisory
- http://www.osvdb.org/1697
- http://www.securityfocus.com/bid/2130PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6106
FAQ
What is CVE-2001-0061?
CVE-2001-0061 is a vulnerability with a CVSS score of 7.2 (HIGH). procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process a...
How severe is CVE-2001-0061?
CVE-2001-0061 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0061?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.