Vulnerability Description
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Conectiva | Linux | 4.0 |
| Debian | Debian Linux | 2.2 |
| Redhat | Linux | 6.0 |
| Suse | Suse Linux | 6.3 |
| Trustix | Secure Linux | 1.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.htmlExploitPatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html
- http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt
- http://www.cert.org/advisories/CA-2000-17.htmlUS Government Resource
- http://www.redhat.com/support/errata/RHSA-2000-043.html
- http://www.securityfocus.com/bid/1480ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/4939
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.htmlExploitPatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html
- http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html
- http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt
- http://www.cert.org/advisories/CA-2000-17.htmlUS Government Resource
FAQ
What is CVE-2000-0666?
CVE-2000-0666 is a vulnerability with a CVSS score of 10.0 (HIGH). rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
How severe is CVE-2000-0666?
CVE-2000-0666 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0666?
Check the references section above for vendor advisories and patch information. Affected products include: Conectiva Linux, Debian Debian Linux, Redhat Linux, Suse Suse Linux, Trustix Secure Linux.