FreeBSD 4.3 does not properly clear shared signal handlers when executing a process, which allows local users to gain privileges by calling rfork with a shared signal handler, having the child process execute a setuid program, and sending a signal to the child.
Link | Tags |
---|---|
http://ciac.llnl.gov/ciac/bulletins/l-111.shtml | third party advisory government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6829 | vdb entry |
http://www.osvdb.org/1897 | vdb entry |
http://archives.neohapsis.com/archives/bugtraq/2001-07/0179.html | mailing list exploit patch vendor advisory |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:42.signal.v1.1.asc | vendor advisory |
http://www.kb.cert.org/vuls/id/943633 | us government resource third party advisory patch |
http://www.securityfocus.com/bid/3007 | exploit vdb entry patch vendor advisory |