4.6
CVSSv2

CVE-2001-0623

Published: 02/08/2001 Updated: 19/12/2017
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
VMScore: 470
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

sendfiled, as included with Simple Asynchronous File Transfer (SAFT), on various Linux systems does not properly drop privileges when sending notification emails, which allows local malicious users to gain privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

sendfile sendfile

Vendor Advisories

Colin Phipps and Daniel Kobras discovered and fixed several serious bugs in the saft daemon `sendfiled' which caused it to drop privileges incorrectly Exploiting this a local user can easily make it execute arbitrary code under root privileges We recommend you upgrade your sendfile packages immediately ...
Daniel Kobras has discovered and fixed a problem in sendfiled which caused the daemon not to drop privileges as expected when sending notification mails Exploiting this, a local user can easily make it execute arbitrary code under root privileges We recommend that you upgrade your sendfile package immediately ...

Exploits

source: wwwsecurityfocuscom/bid/2645/info Sendfile is an implementation of the SAFT (simple asynchronous file transfer) protocol for UNIX systems Due to a problem dropping privileges completely before running user-specified post-processing commands in the Sendfile daemon, it may be possible for a local user to execute arbitrary commands ...
source: wwwsecurityfocuscom/bid/2652/info Sendfile is an implementation of the SAFT (simple asynchronous file transfer) protocol for UNIX systems A serialization error exists in the Sendfile daemon, sendfiled When used in conjunction with other problems found in the daemon, it may be possible for a local user to execute arbitrary comma ...