Vulnerability Name: | CVE-2000-0800 (CCN-4939) | ||||||||
Assigned: | 2000-07-15 | ||||||||
Published: | 2000-07-15 | ||||||||
Updated: | 2008-09-10 | ||||||||
Summary: | String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges. | ||||||||
CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2000-025.0 rpc.statd is not a problem on OpenLinux Source: CCN Type: BugTraq Mailing List, Sun Jul 16 2000 - 21:45:10 CDT Lots and lots of fun with rpc.statd Source: CCN Type: Conectiva Linux Announcement CLSA-2000:250 nfs-utils: Remote root exploit Source: CCN Type: BugTraq Mailing List, Tue Jul 18 2000 - 04:16:13 CDT Trustix Security Advisory - nfs-utils Source: CCN Type: BugTraq Mailing List, Tue Jul 18 2000 - 10:10:50 CDT [Paper] Format bugs. Source: CCN Type: BugTraq Mailing List, Tue Jul 18 2000 - 20:43:19 CDT Linux-Mandrake Security Update Advisory MDKSA-2000:021 Source: MITRE Type: CNA CVE-2000-0666 Source: MITRE Type: CNA CVE-2000-0800 Source: CCN Type: RHSA-2000-043 Revised advisory: Updated package for nfs-utils available Source: CCN Type: CERT Advisory CA-2000-17 Input Validation Problem in rpc.statd Source: CCN Type: CIAC Information Bulletin K-069 Input Validation Problem in rpc.statd Source: DEBIAN Type: Debian Security Advisory 20000719a nfs-common (from nfs-utils) Source: CCN Type: US-CERT VU#34043 rpc.statd vulnerable to remote root compromise via format string stack overwrite Source: SUSE Type: UNKNOWN 20000810 Security Hole in knfsd, all versions Source: CCN Type: OSVDB ID: 443 Linux nfs-utils rpc.statd Remote Format String Source: CCN Type: OSVDB ID: 57715 Linux knfsd / linuxnfs rpc.kstatd Remote Format String Source: CCN Type: BID-1480 Multiple Linux Vendor rpc.statd Remote Format String Vulnerability Source: CCN Type: SuSE Security Announcement #58 knfsd, all versions Source: XF Type: UNKNOWN linux-rpcstatd-format-overwrite(4939) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |