Vulnerability Name:

CVE-2000-0718 (CCN-5085)

Assigned:2000-08-12
Published:2000-08-12
Updated:2008-09-05
Summary:A race condition in MandrakeUpdate allows local users to modify RPM files while they are in the /tmp directory before they are installed.
CVSS v3 Severity:2.9 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:1.2 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
1.2 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:File Manipulation
References:Source: BUGTRAQ
Type: Patch, Vendor Advisory
20000812 MDKSA-2000:034 MandrakeUpdate update

Source: CCN
Type: Helix Code Security Advisory
Helix GNOME Update

Source: CCN
Type: BugTraq Mailing List, Tue Aug 22 2000 - 03:42:35 CDT
Multiple Local Vulnerabilities in Helix Gnome Installer

Source: MITRE
Type: CNA
CVE-2000-0718

Source: CCN
Type: OSVDB ID: 1506
Multiple Linux Updaters RPM Installation Race Condition

Source: BID
Type: Patch, Vendor Advisory
1567

Source: CCN
Type: BID-1567
Linux-Mandrake MandrakeUpdate Race Condition Vulnerability

Source: CCN
Type: MandrakeSoft Security Advisory MDKSA-2000:034
MandrakeUpdate

Source: XF
Type: UNKNOWN
linux-update-race-condition(5085)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:turbolinux:turbolinux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.3:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:6.4:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:caldera:openlinux_edesktop:2.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    mandrakesoft mandrake linux 6.0
    mandrakesoft mandrake linux 6.1
    mandrakesoft mandrake linux 7.0
    mandrakesoft mandrake linux 7.1
    turbolinux turbolinux *
    redhat linux 6.2
    suse suse linux 6.3
    suse suse linux 6.4
    mandrakesoft mandrake linux 7.0
    mandrakesoft mandrake linux 7.1
    mandrakesoft mandrake linux 6.0
    mandrakesoft mandrake linux 6.1
    caldera openlinux edesktop 2.4