Vulnerability Description
The jail_attach system call in FreeBSD 5.1 and 5.2 changes the directory of a calling process even if the process doesn't have permission to change directory, which allows local users to gain read/write privileges to files and directories within another jail.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 5.1 |
References
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.ascPatchVendor Advisory
- http://www.osvdb.org/4101
- http://www.securityfocus.com/bid/9762PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15344
- ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:03.jail.ascPatchVendor Advisory
- http://www.osvdb.org/4101
- http://www.securityfocus.com/bid/9762PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/15344
FAQ
What is CVE-2004-0126?
CVE-2004-0126 is a vulnerability with a CVSS score of 4.6 (MEDIUM). The jail_attach system call in FreeBSD 5.1 and 5.2 changes the directory of a calling process even if the process doesn't have permission to change directory, which allows local users to gain read/wri...
How severe is CVE-2004-0126?
CVE-2004-0126 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-0126?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd.