关于 CVE-2000-0703 的漏洞信息

1. 漏洞描述
From NVD
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
From 神龙GPT (AIGC)
"suidperl(aka sperl)在调用/bin/mail发送错误报告之前,未能正确净化 escape 序列 "~!",这使本地用户能够通过设置"交互式"环境变量并使用包含 escape 序列的文件名调用suidperl来获得权限。
2. 漏洞评分(CVSS)
From NVD
NVD 暂无评分
From 神龙GPT (AIGC)
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3. 漏洞类别
From NVD
NVD 暂无漏洞类别信息
From 神龙GPT (AIGC)
神龙GPT 暂无漏洞类别信息(请耐心等待)
Reference