Vulnerability Description
The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redhat | Tmpwatch | 2.2 |
| Redhat | Linux | 6.1 |
References
- http://www.redhat.com/support/errata/RHSA-2000-080.html
- http://www.securityfocus.com/archive/1/81364
- http://www.securityfocus.com/bid/1664ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5217
- http://www.redhat.com/support/errata/RHSA-2000-080.html
- http://www.securityfocus.com/archive/1/81364
- http://www.securityfocus.com/bid/1664ExploitPatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5217
FAQ
What is CVE-2000-0829?
CVE-2000-0829 is a vulnerability with a CVSS score of 2.1 (LOW). The tmpwatch utility in Red Hat Linux forks a new process for each directory level, which allows local users to cause a denial of service by creating deeply nested directories in /tmp or /var/tmp/.
How severe is CVE-2000-0829?
CVE-2000-0829 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0829?
Check the references section above for vendor advisories and patch information. Affected products include: Redhat Tmpwatch, Redhat Linux.