Vulnerability Description
Hitachi Super-H architecture in NetBSD 1.5 and 1.4.1 allows a local user to gain privileges via modified Status Register contents, which are not properly handled by (1) the sigreturn system call or (2) the process_write_regs kernel routine.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Netbsd | 1.4.1 |
References
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-008.txt.ascPatchVendor Advisory
- http://www.securityfocus.com/bid/2810PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6637
- ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-008.txt.ascPatchVendor Advisory
- http://www.securityfocus.com/bid/2810PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6637
FAQ
What is CVE-2001-0734?
CVE-2001-0734 is a vulnerability with a CVSS score of 7.2 (HIGH). Hitachi Super-H architecture in NetBSD 1.5 and 1.4.1 allows a local user to gain privileges via modified Status Register contents, which are not properly handled by (1) the sigreturn system call or (2...
How severe is CVE-2001-0734?
CVE-2001-0734 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0734?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Netbsd.