Vulnerability Name:

CVE-2001-0424 (CCN-6378)

Assigned:2001-04-16
Published:2001-04-16
Updated:2016-10-18
Summary:BubbleMon 1.31 does not properly drop group privileges before executing programs, which allows local users to execute arbitrary commands with the kmem group id.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Sun Apr 15 2001 - 18:12:53 CDT
BubbleMon 1.31

Source: MITRE
Type: CNA
CVE-2001-0424

Source: BUGTRAQ
Type: UNKNOWN
20010415 BubbleMon 1.31

Source: CCN
Type: Specific Phone Systems Web site
News

Source: CCN
Type: OSVDB ID: 12208
BubbleMon kmem Privilege Local Escalation

Source: BID
Type: Patch, Vendor Advisory
2609

Source: CCN
Type: BID-2609
FreeBSD BubbleMon Privilege Elevation Vulnerability

Source: XF
Type: UNKNOWN
bubblemon-elevate-privileges(6378)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:timecop:bubblemon:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl1:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl2:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl3:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl4:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl6:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl7:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl8:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.0pl9:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test1:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test2:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test3:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test4:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test5:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test6:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.1test7:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.2test1:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.21:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.21test1:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.22:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.23:*:*:*:*:*:*:*
  • OR cpe:/a:timecop:bubblemon:1.31:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    timecop bubblemon 1.0
    timecop bubblemon 1.0pl1
    timecop bubblemon 1.0pl2
    timecop bubblemon 1.0pl3
    timecop bubblemon 1.0pl4
    timecop bubblemon 1.0pl6
    timecop bubblemon 1.0pl7
    timecop bubblemon 1.0pl8
    timecop bubblemon 1.0pl9
    timecop bubblemon 1.1
    timecop bubblemon 1.1test1
    timecop bubblemon 1.1test2
    timecop bubblemon 1.1test3
    timecop bubblemon 1.1test4
    timecop bubblemon 1.1test5
    timecop bubblemon 1.1test6
    timecop bubblemon 1.1test7
    timecop bubblemon 1.2
    timecop bubblemon 1.2test1
    timecop bubblemon 1.3
    timecop bubblemon 1.21
    timecop bubblemon 1.21test1
    timecop bubblemon 1.22
    timecop bubblemon 1.23
    timecop bubblemon 1.31
    freebsd freebsd 6.2 stable
    freebsd freebsd *