Unrated severityNVD Advisory· Published Oct 20, 2000· Updated Apr 16, 2026
CVE-2000-0703
CVE-2000-0703
Description
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
Affected products
4cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:larry_wall:perl:5.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.5:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:larry_wall:perl:5.6:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- www.calderasystems.com/support/security/advisories/CSSA-2000-026.0.txtnvdPatchVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2000-08/0022.htmlnvdExploitVendor Advisory
- www.securityfocus.com/bid/1547nvdExploitPatchVendor Advisory
- archives.neohapsis.com/archives/bugtraq/2000-08/0086.htmlnvd
- archives.neohapsis.com/archives/bugtraq/2000-08/0113.htmlnvd
- archives.neohapsis.com/archives/bugtraq/2000-08/0153.htmlnvd
- www.novell.com/linux/security/advisories/suse_security_announce_59.htmlnvd
- www.redhat.com/support/errata/RHSA-2000-048.htmlnvd
- www.turbolinux.com/pipermail/tl-security-announce/2000-August/000017.htmlnvd
News mentions
0No linked articles in our index yet.