cvelist/2001/0xxx/CVE-2001-0268.json

98 lines
3.0 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2001-0268",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "CSSA-2001-SCO.35",
"refsource" : "CALDERA",
"url" : "http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html"
},
{
"name" : "NetBSD-SA:2001-002",
"refsource" : "NETBSD",
"url" : "http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html"
},
{
"name" : "20010219 Re: your mail",
"refsource" : "BUGTRAQ",
"url" : "http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html"
},
{
"name" : "20010302 The USER_LDT kernel option allows an attacker to gain access to privileged areas of kernel memory.",
"refsource" : "OPENBSD",
"url" : "http://www.openbsd.org/errata.html#userldt"
},
{
"name" : "VU#358960",
"refsource" : "CERT-VN",
"url" : "http://www.kb.cert.org/vuls/id/358960"
},
{
"name" : "2739",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/2739"
},
{
"name" : "6141",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/6141"
},
{
"name" : "user-ldt-validation(6222)",
"refsource" : "XF",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/6222"
}
]
}
}