CVE-1999-0138
Published Jun 26, 1996
Last updated 2 years ago
Overview
- Description
- The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:a_ux:3.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E7A2CCF8-36A1-4E5E-A36F-5E90357A2B42" }, { "criteria": "cpe:2.3:o:digital:osf_1:1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B804A762-00CC-4F03-9E6D-31BB36E4159A" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34797660-41F5-4358-B70F-2A40DE48F182" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "27C9E23D-AB82-4AE1-873E-C5493BB96AA1" }, { "criteria": "cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "19587780-3515-484C-BCB4-F2BB90106C5C" }, { "criteria": "cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E54D276-792B-40D2-B39B-5050028DE988" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC96D014-7CE2-4F61-BBAF-507829C542EA" }, { "criteria": "cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D3C00FC9-AD97-4226-A0EA-7DB14AA592DE" }, { "criteria": "cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BAE3D61-9D78-46D7-87EB-5A33ECF86F83" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCE246DE-641C-44A3-9FCC-5131655DBC1A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A" }, { "criteria": "cpe:2.3:o:nec:asl_ux_4800:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "81B329CB-C41D-4487-A492-C34DC68899B6" }, { "criteria": "cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFDDBA47-A0E3-4EB2-868A-A9B998B0154E" }, { "criteria": "cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6CF54267-A293-44B1-BD9A-14CD39F732C2" }, { "criteria": "cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "875BE14D-96DC-4973-B077-40C7DFC75B02" } ], "operator": "OR" } ] } ]