Show filters
4 Total Results
Displaying 1-4 of 4
Sort by:
Attacker Value
Unknown
CVE-2009-0343
Disclosure Date: January 29, 2009 (last updated October 04, 2023)
Niels Provos Systrace 1.6f and earlier on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 32-bit syscall with a syscall number that corresponds to a policy-compliant 64-bit syscall, related to race conditions that occur in monitoring 64-bit processes.
0
Attacker Value
Unknown
CVE-2009-0342
Disclosure Date: January 29, 2009 (last updated October 04, 2023)
Niels Provos Systrace before 1.6f on the x86_64 Linux platform allows local users to bypass intended access restrictions by making a 64-bit syscall with a syscall number that corresponds to a policy-compliant 32-bit syscall.
0
Attacker Value
Unknown
CVE-2007-4305
Disclosure Date: August 13, 2007 (last updated October 04, 2023)
Multiple race conditions in the (1) Sudo monitor mode and (2) Sysjail policies in Systrace on NetBSD and OpenBSD allow local users to defeat system call interposition, and consequently bypass access control policy and auditing.
0
Attacker Value
Unknown
CVE-2004-2012
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
The systrace_exit function in the systrace utility for NetBSD-current and 2.0 before April 16, 2004, and certain FreeBSD ports, does not verify the owner of the /dec/systrace connection before setting euid to 0, which allows local users to gain root privileges.
0