Vulnerability Name: | CCN-5569 | ||||||
Published: | 2000-11-23 | ||||||
Updated: | 2000-11-23 | ||||||
Summary: | Modprobe is vulnerable to a buffer overflow in the handling of user input passed to the kernel. By sending an invalid argument to the modprobe program, a local attacker can overflow a buffer and execute arbitrary commands to gain root privileges on the system. | ||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||
CVSS v2 Severity: | 10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||
Vulnerability Consequences: | Gain Access | ||||||
References: | Source: CCN Type: Conectiva Linux Announcement CLSA-2000:340 modutils: Local root exploit in modutils Source: DEBIAN Type: Debian Security Advisory 20001122c modutils Source: CCN Type: BID-1989 Linux modprobe Buffer Overflow Vulnerability Source: CCN Type: MandrakeSoft Security Advisory MDKSA-2000:071-2 modutils Source: XF Type: UNKNOWN linux-modprobe-bo(5569) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |