Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2000-0666
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 10/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:conectiva:linux:4.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:4.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:5.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:4.0es:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:5.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:conectiva:linux:4.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.3:*:alpha:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.2:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:trustix:secure_linux:1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.3:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.2:*:alpha:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:trustix:secure_linux:1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:ppc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.2:*:powerpc:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:suse:suse_linux:6.4:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:2.3:*:powerpc:*:*:*:*:* |
Yes
|
- | - |
References
- http://www.securityfocus.com/bid/1480
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html
- http://www.redhat.com/support/errata/RHSA-2000-043.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html
- http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt
- http://www.cert.org/advisories/CA-2000-17.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4939