simpleinit leaves file descriptor open with read/write privileges

simpleinit-file-descriptor-open (9357) The risk level is classified as HighHigh Risk


simpleinit opens a file descriptor for some child processes with read/write access in order to pass instructions to simpleinit. A local attacker with the ability to inherit the file descriptor can use this vulnerability to execute arbitrary code on the system with root privileges.


Gain Privileges


No remedy available as of September 1, 2014.


  • BugTraq Mailing List, Wed Jun 12 2002 - 22:36:50 CDT: simpleinit root exploit - file descriptor left open.
  • BID-5001: Richard Gooch SimpleInit Open File Descriptor Vulnerability
  • CVE-2002-0767: simpleinit on Linux systems does not close a read/write FIFO file descriptor before creating a child process, which allows the child process to cause simpleinit to execute arbitrary programs with root privileges.
  • OSVDB ID: 14437: simpleinit File Descriptor Child Process Arbitrary Command Execution

Platforms Affected:

  • Richard Gooch simpleinit 2.0.2


Jun 13, 2002

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page