6.2
CVSSv2

CVE-2001-0905

Published: 18/10/2001 Updated: 10/10/2017
CVSS v2 Base Score: 6.2 | Impact Score: 10 | Exploitability Score: 1.9
VMScore: 552
Vector: AV:L/AC:H/Au:N/C:C/I:C/A:C

Vulnerability Summary

Race condition in signal handling of procmail 3.20 and previous versions, when running setuid, allows local users to cause a denial of service or gain root privileges by sending a signal while a signal handling routine is already running.

Vulnerable Product Search on Vulmon Subscribe to Product

procmail procmail

Vendor Advisories

Using older versions of procmail it was possible to make procmail crash by sending it signals On systems where procmail is installed setuid this could be exploited to obtain unauthorized privileges This problem has been fixed in version 320 by the upstream maintainer, included in Debian unstable, and was ported back to version 3152 which is av ...