Vulnerability Name:

CVE-2000-0998 (CCN-5486)

Assigned:2000-11-01
Published:2000-11-01
Updated:2008-09-05
Summary:Format string vulnerability in top program allows local attackers to gain root privileges via the "kill" or "renice" function.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: FREEBSD
Type: Patch, Vendor Advisory
FreeBSD-SA-00:62

Source: CCN
Type: OpenBSD FTP site
OpenBSD 2.7 source level patches for printf-style format string bugs

Source: MISC
Type: UNKNOWN
ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch

Source: CCN
Type: BugTraq Mailing List, Wed Nov 14 2001 - 10:54:30 CST
SCO skunkware top format strings issue

Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-00:62
top allows reading of kernel memory

Source: MITRE
Type: CNA
CVE-2000-0998

Source: CCN
Type: Group Sys Consulting Web site
Unix Top

Source: CCN
Type: OpenBSD Security Fix 028, Oct 6, 2000
There are printf-style format string bugs in several privileged programs.

Source: CCN
Type: OSVDB ID: 12801
William LeFebvre top Multiple Function Format String

Source: BID
Type: Patch, Vendor Advisory
1895

Source: CCN
Type: BID-1895
Multiple Vendor top Format String Vulnerability

Source: XF
Type: UNKNOWN
top-format-string(5486)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:freebsd:freebsd:3.5:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.5:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.5.1:release:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.5.1:stable:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.5:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:2.7:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:3.5.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    freebsd freebsd 3.5
    freebsd freebsd 3.5 stable
    freebsd freebsd 3.5.1
    freebsd freebsd 3.5.1 release
    freebsd freebsd 3.5.1 stable
    freebsd freebsd 4.0
    freebsd freebsd 4.0 alpha
    freebsd freebsd 4.1
    freebsd freebsd 4.1.1
    freebsd freebsd 4.0
    freebsd freebsd 4.0 alpha
    freebsd freebsd 3.5
    openbsd openbsd 2.7
    freebsd freebsd 4.1.1
    freebsd freebsd 4.1
    freebsd freebsd 3.5.1