Vulnerability Name:

CVE-2000-0751 (CCN-27870)

Assigned:2000-07-05
Published:2000-07-05
Updated:2008-09-05
Summary:mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: BUGTRAQ
Type: Vendor Advisory
20000808 OpenBSD 2.7 / NetBSD 1.4.2 mopd buffer overflow

Source: CCN
Type: BugTraq Mailing List, Tue Aug 08 2000 - 02:48:04 CDT
OpenBSD 2.7 / NetBSD 1.4.2 mopd buffer overflow

Source: FREEBSD
Type: Patch, Vendor Advisory
FreeBSD-SA-00:40

Source: MITRE
Type: CNA
CVE-2000-0751

Source: MISC
Type: UNKNOWN
http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h

Source: CCN
Type: The NetBSD Project Web site
The NetBSD Project

Source: CCN
Type: OpenBSD Web site
About OpenBSD

Source: OPENBSD
Type: UNKNOWN
20000705 Mopd contained a buffer overflow.

Source: CCN
Type: OSVDB ID: 1499
Multiple Vendor mopd User Inputted Data Format String

Source: CCN
Type: Red Hat Inc, Web site
Red Hat | The Open Source Leader

Source: REDHAT
Type: UNKNOWN
RHSA-2000:050

Source: BID
Type: Patch, Vendor Advisory
1559

Source: CCN
Type: BID-1559
Multiple Vendor mopd User Inputted Data Used as Format String Vulnerability

Source: XF
Type: UNKNOWN
mopd-format-string(27870)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:openbsd:openbsd:2.4:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.6:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.7:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    netbsd netbsd 1.4.1
    netbsd netbsd 1.4.2
    openbsd openbsd 2.4
    openbsd openbsd 2.5
    openbsd openbsd 2.6
    openbsd openbsd 2.7
    redhat linux 6.0
    redhat linux 6.1
    redhat linux 6.2
    openbsd openbsd 2.4
    openbsd openbsd 2.5
    redhat linux 6.0
    redhat linux 6.1
    netbsd netbsd 1.4.1
    redhat linux 6.2
    openbsd openbsd 2.6
    netbsd netbsd 1.4.2
    openbsd openbsd 2.7