ID CVE-2003-0501
Summary The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
References
Vulnerable Configurations
  • cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
    cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*
CVSS
Base: 2.1 (as of 03-05-2018 - 01:29)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:L/AC:L/Au:N/C:P/I:N/A:N
oval via4
accepted 2007-04-25T19:52:27.525-04:00
class vulnerability
contributors
  • name Jay Beale
    organization Bastille Linux
  • name Jay Beale
    organization Bastille Linux
  • name Thomas R. Jones
    organization Maitreya Security
description The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.
family unix
id oval:org.mitre.oval:def:328
status accepted
submitted 2003-09-26T12:00:00.000-04:00
title Linux Kernel /proc/self setuid Vulnerability
version 38
redhat via4
advisories
  • rhsa
    id RHSA-2003:198
  • rhsa
    id RHSA-2003:238
  • rhsa
    id RHSA-2003:239
refmap via4
bugtraq 20030620 Linux /proc sensitive information disclosure
debian
  • DSA-358
  • DSA-423
suse SuSE-SA:2003:034
Last major update 03-05-2018 - 01:29
Published 07-08-2003 - 04:00
Last modified 03-05-2018 - 01:29
Back to Top