Vulnerability Description
Multiple buffer overflows in LBNL tcpdump allow remote attackers to execute arbitrary commands.
CVSS Score
10.0
HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lbl | Tcpdump | 3.4 |
References
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:61.tcpdump.v1.1.
- http://archives.neohapsis.com/archives/linux/suse/2000-q4/0681.html
- http://www.securityfocus.com/bid/1870PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5480
- ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:61.tcpdump.v1.1.
- http://archives.neohapsis.com/archives/linux/suse/2000-q4/0681.html
- http://www.securityfocus.com/bid/1870PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5480
FAQ
What is CVE-2000-1026?
CVE-2000-1026 is a vulnerability with a CVSS score of 10.0 (HIGH). Multiple buffer overflows in LBNL tcpdump allow remote attackers to execute arbitrary commands.
How severe is CVE-2000-1026?
CVE-2000-1026 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-1026?
Check the references section above for vendor advisories and patch information. Affected products include: Lbl Tcpdump.