Vulnerability Name:

CVE-2001-1029 (CCN-8697)

Assigned:2001-09-20
Published:2001-09-20
Updated:2017-10-10
Summary:libutil in OpenSSH on FreeBSD 4.4 and earlier does not drop privileges before verifying the capabilities for reading the copyright and welcome files, which allows local users to bypass the capabilities checks and read arbitrary files by specifying alternate copyright or welcome files.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: FreeBSD, Inc. FTP site
/pub/FreeBSD/

Source: BUGTRAQ
Type: Exploit
20010920 Local vulnerability in libutil derived with FreeBSD 4.4-RC (and earlier)

Source: CCN
Type: BugTraq Mailing List, Thu Sep 20 2001 - 14:48:34 CDT
Local vulnerability in libutil derived with FreeBSD 4.4-RC (and earlier)

Source: MITRE
Type: CNA
CVE-2001-1029

Source: CCN
Type: FreeBSD, Inc. Web site
FreeBSD 4.5 Announcement

Source: OSVDB
Type: UNKNOWN
6073

Source: CCN
Type: OSVDB ID: 6073
OpenSSH on FreeBSD libutil Arbitrary File Read

Source: XF
Type: UNKNOWN
bsd-libutil-privilege-dropping(8697)

Source: XF
Type: UNKNOWN
bsd-libutil-privilege-dropping(8697)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:openbsd:openssh:4.5:-:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:freebsd:freebsd:*:*:*:*:*:*:*:* (Version <= 4.4)

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    openbsd openssh 4.5
    freebsd freebsd *
    freebsd freebsd 4.1.1
    freebsd freebsd 4.1
    freebsd freebsd 4.2
    freebsd freebsd 4.3 -
    freebsd freebsd 4.4 -