CVE-2000-0703
suidperl - Privilege Escalation
Title source: llmDescription
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Michal Zalewski · bashlocallinux
https://www.exploit-db.com/exploits/20142
exploitdb
WORKING POC
VERIFIED
by Sebastian Krahmer · perllocallinux
https://www.exploit-db.com/exploits/20141
References (9)
Scores
EPSS
0.0025
EPSS Percentile
48.0%
Details
Status
published
Products (4)
larry_wall/perl
5.4.5
larry_wall/perl
5.5
larry_wall/perl
5.5.3
larry_wall/perl
5.6
Published
Oct 20, 2000
Tracked Since
Feb 18, 2026