10
CVSSv2

CVE-2000-0666

Published: 16/07/2000 Updated: 03/05/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

conectiva linux 4.1

conectiva linux 4.2

conectiva linux 5.0

conectiva linux 5.1

conectiva linux 4.0

conectiva linux 4.0es

debian debian linux 2.2

debian debian linux 2.3

redhat linux 6.1

suse suse linux 6.4

redhat linux 6.2

suse suse linux 7.0

redhat linux 6.0

suse suse linux 6.3

trustix secure linux 1.0

trustix secure linux 1.1

Exploits

source: wwwsecurityfocuscom/bid/1480/info A vulnerability exists in the 'rpcstatd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions Because of a format-string vulnerability when calling the 'syslog()' function, a remote attacker can execute code as root The 'rpcstatd' ...
source: wwwsecurityfocuscom/bid/1480/info A vulnerability exists in the 'rpcstatd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions Because of a format-string vulnerability when calling the 'syslog()' function, a remote attacker can execute code as root The 'rpcstatd' ser ...
source: wwwsecurityfocuscom/bid/1480/info A vulnerability exists in the 'rpcstatd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions Because of a format-string vulnerability when calling the 'syslog()' function, a remote attacker can execute code as root The 'rpcstatd' se ...