7.2
CVSSv2

CVE-2000-0703

Published: 20/10/2000 Updated: 10/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 730
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

Vulnerable Product Search on Vulmon Subscribe to Product

larry wall perl 5.4.5

larry wall perl 5.5

larry wall perl 5.5.3

larry wall perl 5.6

Exploits

source: wwwsecurityfocuscom/bid/1547/info The interaction between some security checks performed by suidperl, the setuid version of perl, and the /bin/mail program creates a scenario that allows local malicious users to execute commands with root privileges The suidperl program performs a number of checks to make sure it can't be fooled ...
source: wwwsecurityfocuscom/bid/1547/info The interaction between some security checks performed by suidperl, the setuid version of perl, and the /bin/mail program creates a scenario that allows local malicious users to execute commands with root privileges The suidperl program performs a number of checks to make sure it can't be fool ...