VYPR
Unrated severityNVD Advisory· Published Oct 20, 2000· Updated Apr 16, 2026

CVE-2000-0703

CVE-2000-0703

Description

suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.

Affected products

4
  • Larry Wall/Perl4 versions
    cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
    • cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:larry_wall:perl:5.6:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.