Vulnerability Description
FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 4.0 |
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.a
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.htmlExploitPatchVendor Advisory
- http://ciac.llnl.gov/ciac/bulletins/l-111.shtml
- http://www.kb.cert.org/vuls/id/943633PatchThird Party AdvisoryUS Government Resource
- http://www.osvdb.org/1897
- http://www.securityfocus.com/bid/3007ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6829
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.a
- http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.htmlExploitPatchVendor Advisory
- http://ciac.llnl.gov/ciac/bulletins/l-111.shtml
- http://www.kb.cert.org/vuls/id/943633PatchThird Party AdvisoryUS Government Resource
- http://www.osvdb.org/1897
- http://www.securityfocus.com/bid/3007ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6829
FAQ
What is CVE-2001-1180?
CVE-2001-1180 is a vulnerability with a CVSS score of 7.2 (HIGH). FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process...
How severe is CVE-2001-1180?
CVE-2001-1180 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-1180?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.