Описание
The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2001-0268
- https://exchange.xforce.ibmcloud.com/vulnerabilities/6222
- http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html
- http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html
- http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html
- http://www.kb.cert.org/vuls/id/358960
- http://www.openbsd.org/errata.html#userldt
- http://www.osvdb.org/6141
- http://www.securityfocus.com/bid/2739
EPSS
CVE ID
Связанные уязвимости
The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.
EPSS