Vulnerability Name: | CVE-2000-1095 (CCN-5516) | ||||||||
Assigned: | 2000-11-12 | ||||||||
Published: | 2000-11-12 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: BUGTRAQ Type: UNKNOWN 20001112 RedHat 7.0 (and SuSE): modutils + netkit = root compromise. (fwd) Source: CCN Type: BugTraq Mailing List, Sun Nov 12 2000 - 15:46:53 CST RedHat 7.0 (and SuSE): modutils + netkit = root compromise. (fwd) Source: CCN Type: Conectiva Linux Announcement CLSA-2000:340 modutils: Local root exploit in modutils Source: SUSE Type: UNKNOWN SuSE-SA:2000:44 Source: MITRE Type: CNA CVE-2000-1095 Source: CONECTIVA Type: UNKNOWN CLSA-2000:340 Source: CCN Type: RHSA-2000-108 new modutils release addresses more local root compromise possibilities Source: CCN Type: CIAC Information Bulletin L-020 Red Hat Linux modutils Vulnerability Source: DEBIAN Type: UNKNOWN 20001120 modutils: local exploit Source: DEBIAN Type: Debian Security Advisory 20001120 modutils: local exploit Source: MANDRAKE Type: UNKNOWN MDKSA-2000:071 Source: CCN Type: OSVDB ID: 1641 Linux modprobe popen Function Arbitrary Command Execution Source: REDHAT Type: Patch, Vendor Advisory RHSA-2000:108 Source: BID Type: Exploit, Patch, Vendor Advisory 1936 Source: CCN Type: BID-1936 Linux modprobe Arbitrary Command Execution Vulnerability Source: CCN Type: SuSE Security Announcement SuSE-SA:2000:044 modules Source: CCN Type: MandrakeSoft Security Advisory MDKSA-2000:071-2 modutils Source: XF Type: UNKNOWN linux-modprobe-execute-code(5516) Source: XF Type: UNKNOWN linux-modprobe-execute-code(5516) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |