7.2
CVSSv2

CVE-2000-0172

Published: 03/03/2000 Updated: 10/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

matt kimball and roger wolff mtr 0.41

matt kimball and roger wolff mtr 0.28

turbolinux turbolinux 3.5b2

turbolinux turbolinux 4.2

turbolinux turbolinux 6.0.2

turbolinux turbolinux 4.4

Exploits

source: wwwsecurityfocuscom/bid/1038/info A potential vulnerability exists in the 'mtr' program, by Matt Kimball and Roger Wolff Versions prior to 042 incorrectly dropped privileges on all Unix variants except HPUX By calling a seteuid(getuid()) call, the authors hoped to drop permissions to prevent the obtaining of root privilege shou ...