Vulnerability Description
Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Netbsd | Netbsd | 1.4.1 |
| Openbsd | Openbsd | 2.4 |
| Redhat | Linux | 6.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.htmlVendor Advisory
- http://archives.neohapsis.com/archives/freebsd/2000-08/0336.htmlPatchVendor Advisory
- http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1
- http://www.openbsd.org/errata.html#mopd
- http://www.redhat.com/support/errata/RHSA-2000-050.html
- http://www.securityfocus.com/bid/1558PatchVendor Advisory
- http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.htmlVendor Advisory
- http://archives.neohapsis.com/archives/freebsd/2000-08/0336.htmlPatchVendor Advisory
- http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1
- http://www.openbsd.org/errata.html#mopd
- http://www.redhat.com/support/errata/RHSA-2000-050.html
- http://www.securityfocus.com/bid/1558PatchVendor Advisory
FAQ
What is CVE-2000-0750?
CVE-2000-0750 is a vulnerability with a CVSS score of 7.5 (HIGH). Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name.
How severe is CVE-2000-0750?
CVE-2000-0750 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0750?
Check the references section above for vendor advisories and patch information. Affected products include: Netbsd Netbsd, Openbsd Openbsd, Redhat Linux.