CVE-1999-0022 Details

CVE-1999-0022

Published: 1996-07-03
Last Modified: 2018-10-30
CVE Author: NIST National Vulnerability Database
CVE Assigner: cve@mitre.org
Summary

Local user gains root privileges via buffer overflow in rdist, via expstr() function.

Analysis
Common Vulnerability Score System v2.0
Metrics Value
Severity High
Base Score 7.2/10
Exploit Score 3.9/10
Access Vector Local
Access Complexity Low
Authentication None
Impact Score 10/10
Confidentiality Impact Complete
Availability Impact Complete
Integrity Impact Complete
Vector String AV:L/AC:L/Au:N/C:C/I:C/A:C
Common Vulnerability Score System v3.1

NIST has not assigned a CVSSv3.1 Score.

Products Reported
CPE Vulnerable Start Excluding
cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:solaris:4.1.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:* Yes - -
cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:* Yes - -
References

http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179

CVE ID
CVE-1999-0022
Published
1996-07-03
Modified
2018-10-30
CVSSv2.0
High
PCI Compliance
Fail
Data Format
MITRE
Data Type
CVE
Data Version
4.0
CWE

NVD-CWE-Other

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities.