Vulnerability Name:

CVE-2001-0317 (CCN-6080)

Assigned:2001-02-08
Published:2001-02-08
Updated:2017-10-10
Summary:Race condition in ptrace in Linux kernel 2.4 and 2.2 allows local users to gain privileges by using ptrace to track and modify a running setuid process.
CVSS v3 Severity:4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
3.7 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-009.0
security problems in ptrace and sysctl

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-012.0
several security problems in linux kernel

Source: CCN
Type: Caldera Systems, Inc. Security Advisory CSSA-2001-012.0
several security problems in linux kernel

Source: BUGTRAQ
Type: Patch, Vendor Advisory
20010213 Trustix Security Advisory - proftpd, kernel

Source: CCN
Type: BugTraq Mailing List, Tue Feb 13 2001 - 08:19:43 CST
Trustix Security Advisory - proftpd, kernel

Source: CCN
Type: BugTraq Mailing List, Fri Jun 15 2001 - 02:18:15 CDT
Re: OpenBSD 2.9,2.8 local root compromise

Source: CCN
Type: BugTraq Mailing List, Fri Jun 15 2001 - 01:38:03 CDT
Re: OpenBSD 2.9,2.8 local root compromise

Source: CCN
Type: BugTraq Mailing List, Thu Jun 14 2001 - 16:03:17 CDT
RE: OpenBSD 2.9,2.8 local root compromise

Source: CCN
Type: BugTraq Mailing List, Thu Feb 08 2001 - 16:52:02 CST
Immunix OS Security update for kernel

Source: MITRE
Type: CNA
CVE-2001-0317

Source: CCN
Type: Conectiva Linux Announcement CLSA-2001:394
kernel

Source: CCN
Type: Immunix OS Security Advisory IMNX-2001-70-010-01
kernel

Source: CCN
Type: Progeny Linux Systems Security Advisory PROGENY-SA-2001-01A
execve()/ptrace() exploit in Linux kernels prior to 2.2.19

Source: CCN
Type: RHSA-2001-013
Three security holes fixed in new kernel

Source: CCN
Type: RHSA-2001-047
Linux kernel 2.2.19 now available

Source: CALDERA
Type: Patch, Vendor Advisory
CSSA-2001-009

Source: CCN
Type: CIAC Information Bulletin L-045
Red Hat Linux 'sysctl, ptrace, & mxcsr P4 ' Vulnerability

Source: CCN
Type: CIAC Information Bulletin L-076
Red Hat Ptrace and Exec Race Conditions

Source: DEBIAN
Type: DSA-047
kernel -- multiple security problems

Source: CCN
Type: Georgi Guninski Security Advisory #47
OpenBSD 2.9,2.8 local root compromise

Source: CCN
Type: US-CERT VU#176888
Linux kernel contains race condition via ptrace/procfs/execve

Source: CCN
Type: Linux-Mandrake Security Update Advisory MDKSA-2001:037
kernel

Source: CCN
Type: NetBSD Web site
NetBSD Security Advisories

Source: CCN
Type: OpenBSD Security Fix 007: June 15, 2001
A race condition exists in the kernel execve(2) implementation that opens a small window of vulnerability for a non-privileged user to ptrace(2) attach to a suid/sgid process.

Source: CCN
Type: OSVDB ID: 5843
Multiple Unix Kernel ptrace Track SUID Privilege Escalation

Source: REDHAT
Type: UNKNOWN
RHSA-2001:013

Source: CCN
Type: BID-2529
Linux ptrace/execve Race Condition Vulnerability

Source: CCN
Type: BID-2873
Multiple BSD Vendor exec() Ptrace Race Condition Vulnerability

Source: CCN
Type: SuSE Security Announcement SuSE-SA:2001:018
kernel

Source: CCN
Type: Trustix Secure Linux Security Advisory #2001-0003
kernel

Source: CCN
Type: USSG Indiana University Web Site
Linux 2.2.19 Release Notes

Source: XF
Type: UNKNOWN
linux-ptrace-modify-process(6080)

Source: XF
Type: UNKNOWN
linux-ptrace-modify-process(6080)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.4.0:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.8:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.01:*:*:*:*:*:*:*
  • OR cpe:/o:trustix:secure_linux:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    linux linux kernel 2.2.0
    linux linux kernel 2.4.0
    linux linux kernel 2.2.0
    linux linux kernel 2.4.0
    redhat linux 6.1
    netbsd netbsd 1.4.1
    redhat linux 6.2
    debian debian linux 2.2
    netbsd netbsd 1.4.2
    trustix secure linux 1.1
    redhat linux 7
    openbsd openbsd 2.8
    netbsd netbsd 1.5
    trustix secure linux 1.01
    trustix secure linux 1.2
    openbsd openbsd 2.9