Vulnerability Name:

CVE-2000-0667 (CCN-4998)

Assigned:2000-07-27
Published:2000-07-27
Updated:2008-09-10
Summary:Vulnerability in gpm in Caldera Linux allows local users to delete arbitrary files or conduct a denial of service.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:3.6 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
References:Source: CALDERA
Type: Exploit, Patch, Vendor Advisory
CSSA-2000-024.0

Source: CCN
Type: Conectiva Linux Announcement CLSA-2000:248
gpm: Arbitrary file removal possible

Source: MITRE
Type: CNA
CVE-2000-0667

Source: CCN
Type: US-CERT VU#25701
Linux gpm daemon allows arbitrary file removal

Source: CCN
Type: OSVDB ID: 13716
Caldera Linux /dev/gpmctl STREAM Sockets Saturation DoS

Source: BID
Type: Exploit, Patch, Vendor Advisory
1512

Source: CCN
Type: BID-1512
Linux gpm File Removal Vulnerability

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2000:025
gpm

Source: XF
Type: UNKNOWN
linux-gpm-file-removal(4998)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:conectiva:linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:4.0es:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:5.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:mandrakesoft:mandrake_linux:-:*:*:*:*:*:*:*
  • OR cpe:/a:connectiva:linux:-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    conectiva linux 4.0
    conectiva linux 4.0es
    conectiva linux 4.1
    conectiva linux 4.2
    conectiva linux 5.0
    conectiva linux 5.1
    mandrakesoft mandrake linux -
    connectiva linux -