10
CVSSv2

CVE-2000-0666

Published: 16/07/2000 Updated: 03/05/2018
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 1000
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote malicious users to gain root privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

conectiva linux 4.2

conectiva linux 4.1

conectiva linux 5.1

conectiva linux 4.0es

conectiva linux 5.0

conectiva linux 4.0

suse suse linux 6.3

debian debian linux 2.3

debian debian linux 2.2

trustix secure linux 1.1

redhat linux 6.1

redhat linux 6.2

redhat linux 6.0

trustix secure linux 1.0

suse suse linux 6.4

suse suse linux 7.0

Exploits

source: wwwsecurityfocuscom/bid/1480/info A vulnerability exists in the 'rpcstatd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions Because of a format-string vulnerability when calling the 'syslog()' function, a remote attacker can execute code as root The 'rpcstatd' ...
source: wwwsecurityfocuscom/bid/1480/info A vulnerability exists in the 'rpcstatd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions Because of a format-string vulnerability when calling the 'syslog()' function, a remote attacker can execute code as root The 'rpcstatd' se ...
source: wwwsecurityfocuscom/bid/1480/info A vulnerability exists in the 'rpcstatd' program, which is part of the 'nfs-utils' package that is shipped with a number of popular Linux distributions Because of a format-string vulnerability when calling the 'syslog()' function, a remote attacker can execute code as root The 'rpcstatd' ser ...